Sciweavers

1361 search results - page 218 / 273
» Boolean Comparison by Simulation
Sort
View
APNOMS
2008
Springer
14 years 12 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
BIBM
2008
IEEE
106views Bioinformatics» more  BIBM 2008»
14 years 12 months ago
Uncovering Genomic Reassortments among Influenza Strains by Enumerating Maximal Bicliques
The evolutionary histories of viral genomes have received significant recent attention due to their importance in understanding virulence and the corresponding ramifications to pu...
Niranjan Nagarajan, Carl Kingsford
IMECS
2007
14 years 11 months ago
Metamodel-Assisted Global Search Using a Probing Technique
—This paper presents a new metamodel-assisted metaheuristic algorithm for optimisation problems involving computationally expensive simulations. The algorithm, called Global Prob...
Anna Persson, Henrik Grimm, Amos Ng
NIPS
2007
14 years 11 months ago
Boosting Algorithms for Maximizing the Soft Margin
We present a novel boosting algorithm, called SoftBoost, designed for sets of binary labeled examples that are not necessarily separable by convex combinations of base hypotheses....
Manfred K. Warmuth, Karen A. Glocer, Gunnar Rä...
WCE
2008
14 years 11 months ago
IEEE 802.11E Block Acknowledgement Policies
Optimisation of IEEE 802.11e MAC protocol performance can be performed by modifying several parameters left open in the standard, like buffer size and acknowledgement policies. In ...
Orlando Cabral, Alberto Segarra, Fernando J. Velez