Sciweavers

3616 search results - page 413 / 724
» Conditional Memory Ordering
Sort
View
141
Voted
CORR
2008
Springer
113views Education» more  CORR 2008»
15 years 3 months ago
Document stream clustering: experimenting an incremental algorithm and AR-based tools for highlighting dynamic trends
We address here two major challenges presented by dynamic data mining: 1) the stability challenge: we have implemented a rigorous incremental density-based clustering algorithm, i...
Alain Lelu, Martine Cadot, Pascal Cuxac
ENTCS
2008
150views more  ENTCS 2008»
15 years 3 months ago
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to st...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
CORR
2006
Springer
132views Education» more  CORR 2006»
15 years 3 months ago
Cross-Entropy method: convergence issues for extended implementation
The cross-entropy method (CE) developed by R. Rubinstein is an elegant practical principle for simulating rare events. The method approximates the probability of the rare event by...
Frédéric Dambreville
125
Voted
DM
2006
144views more  DM 2006»
15 years 3 months ago
On almost self-complementary graphs
A graph is called almost self-complementary if it is isomorphic to one of its almost complements Xc - I, where Xc denotes the complement of X and I a perfect matching (1-factor) i...
Primoz Potocnik, Mateja Sajna
IJCSA
2006
121views more  IJCSA 2006»
15 years 3 months ago
Evaluation of the RC4 Algorithm for Data Encryption
Analysis of the effect of different parameters of the RC4 encryption algorithm where examined. Some experimental work was performed to illustrate the performance of this algorithm...
Allam Mousa, Ahmad Hamad