Sciweavers

1974 search results - page 196 / 395
» Conditional Purchase Orders
Sort
View
147
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 5 months ago
Constant-Weight Gray Codes for Local Rank Modulation
We consider the local rank-modulation scheme in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. The local rankmodulation, ...
Moshe Schwartz
CORR
2008
Springer
113views Education» more  CORR 2008»
15 years 5 months ago
Document stream clustering: experimenting an incremental algorithm and AR-based tools for highlighting dynamic trends
We address here two major challenges presented by dynamic data mining: 1) the stability challenge: we have implemented a rigorous incremental density-based clustering algorithm, i...
Alain Lelu, Martine Cadot, Pascal Cuxac
151
Voted
ENTCS
2008
150views more  ENTCS 2008»
15 years 5 months ago
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to st...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
131
Voted
CORR
2006
Springer
132views Education» more  CORR 2006»
15 years 5 months ago
Cross-Entropy method: convergence issues for extended implementation
The cross-entropy method (CE) developed by R. Rubinstein is an elegant practical principle for simulating rare events. The method approximates the probability of the rare event by...
Frédéric Dambreville
135
Voted
DM
2006
144views more  DM 2006»
15 years 5 months ago
On almost self-complementary graphs
A graph is called almost self-complementary if it is isomorphic to one of its almost complements Xc - I, where Xc denotes the complement of X and I a perfect matching (1-factor) i...
Primoz Potocnik, Mateja Sajna