Sciweavers

701 search results - page 50 / 141
» Design patterns for lazy evaluation
Sort
View
DATAMINE
2006
83views more  DATAMINE 2006»
14 years 12 months ago
Structural Hidden Markov Models Using a Relation of Equivalence: Application to Automotive Designs
Standard hidden Markov models (HMM's) have been studied extensively in the last two decades. It is well known that these models assume state conditional independence of the ob...
Djamel Bouchaffra, Jun Tan
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 11 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
EUROMICRO
2006
IEEE
15 years 5 months ago
Using WS-BPEL to Implement Software Fault Tolerance for Web Services
One area of the web services architecture yet to be standardised is that of fault tolerance for services. At the same time, WS-BPEL is moving from a de facto standard to an OASIS ...
Glen Dobson
SIGMOD
2010
ACM
196views Database» more  SIGMOD 2010»
15 years 15 hour ago
GAIA: graph classification using evolutionary computation
Discriminative subgraphs are widely used to define the feature space for graph classification in large graph databases. Several scalable approaches have been proposed to mine disc...
Ning Jin, Calvin Young, Wei Wang
COLING
2002
14 years 11 months ago
Probabilistic Models of Verb-Argument Structure
We evaluate probabilistic models of verb argument structure trained on a corpus of verbs and their syntactic arguments. Models designed to represent patterns of verb alternation b...
Daniel Gildea