Sciweavers

549 search results - page 18 / 110
» Computing All the Best Swap Edges Distributively
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
15 years 10 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
TAMC
2009
Springer
15 years 4 months ago
Approximation and Hardness Results for Label Cut and Related Problems
We investigate a natural combinatorial optimization problem called the Label Cut problem. Given an input graph G with a source s and a sink t, the edges of G are classified into ...
Peng Zhang, Jin-yi Cai, Linqing Tang, Wenbo Zhao
DM
2010
127views more  DM 2010»
14 years 9 months ago
Enumeration and limit laws of dissections on a cylinder
We compute the generating function for triangulations on a cylinder, with the restriction that all vertices belong to its boundary and that the intersection of a pair of different ...
Juanjo Rué
NIPS
2004
14 years 11 months ago
Heuristics for Ordering Cue Search in Decision Making
Simple lexicographic decision heuristics that consider cues one at a time in a particular order and stop searching for cues as soon as a decision can be made have been shown to be...
Peter M. Todd, Anja Dieckmann
ICPPW
2007
IEEE
15 years 4 months ago
Event Processing Middleware for Wireless Sensor Networks
With the growth in the computation capacity of sensor nodes, they are increasingly equipped to handle more complex functions. Moreover, the need to realize the complete loop of se...
S. Selvakennedy, Uwe Röhm, Bernhard Scholz