Sciweavers

761 search results - page 53 / 153
» Concise and Consistent Naming
Sort
View
EPIA
2005
Springer
15 years 10 months ago
User Group Profile Modeling Based on User Transactional Data for Personalized Systems
In this paper, we propose a framework named UMT (User-profile Modeling based on Transactional data) for modeling user group profiles based on the transactional data. UMT is a gener...
Yiling Yang, Nuno C. Marques
GECCO
2005
Springer
109views Optimization» more  GECCO 2005»
15 years 10 months ago
A hybrid evolutionary algorithm for the p-median problem
A hybrid evolutionary algorithm (EA) for the p-median problem consist of two stages, each of which is a steady-state hybrid EA. These EAs encode selections of medians as subsets o...
István Borgulya
ISMIS
2005
Springer
15 years 10 months ago
Bitmap Index-Based Decision Trees
In this paper we propose an original approach to apply data mining algorithms, namely decision tree-based methods, taking into account not only the size of processed databases but ...
Cécile Favre, Fadila Bentayeb
117
Voted
ISPA
2005
Springer
15 years 10 months ago
ER-TCP: An Efficient Fault-Tolerance Scheme for TCP Connections
Abstract. This paper proposes a novel scheme, named ER-TCP, which transparently masks the failures happened on the server nodes in a cluster from clients at TCP connection granular...
Zhiyuan Shao, Hai Jin, Bin Cheng, Wenbin Jiang
MYCRYPT
2005
Springer
187views Cryptology» more  MYCRYPT 2005»
15 years 10 months ago
Distinguishing Attacks on T-Functions
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function an...
Simon Künzli 0002, Pascal Junod, Willi Meier