Sciweavers

10909 search results - page 310 / 2182
» Evaluating Backup Algorithms
Sort
View
PPSN
2010
Springer
15 years 3 months ago
Privacy-Preserving Multi-Objective Evolutionary Algorithms
Existing privacy-preserving evolutionary algorithms are limited to specific problems securing only cost function evaluation. This lack of functionality and security prevents thei...
Daniel Funke, Florian Kerschbaum
ITIIS
2010
190views more  ITIIS 2010»
14 years 12 months ago
An Efficient String Matching Algorithm Using Bidirectional and Parallel Processing Structure for Intrusion Detection System
Rapid growth of internet applications has increased the importance of intrusion detection system (IDS) performance. String matching is the most computation-consuming task in IDS. ...
Gwo-Ching Chang, Yue-Der Lin
127
Voted
IJCNLP
2005
Springer
15 years 10 months ago
Document Clustering with Grouping and Chaining Algorithms
Document clustering has many uses in natural language tools and applications. For instance, summarizing sets of documents that all describe the same event requires first identifyi...
Yllias Chali, Soufiane Noureddine
CVPR
2001
IEEE
16 years 7 months ago
An Adaptive Algorithm for Text Detection from Natural Scenes
We present a new adaptive algorithm for automatic detection of text from a natural scene. The initial cues of text regions are first detected from the captured image/video. An ada...
Jiang Gao, Jie Yang
ICML
2003
IEEE
16 years 5 months ago
Online Choice of Active Learning Algorithms
This paper is concerned with the question of how to online combine an ensemble of active learners so as to expedite the learning progress during a pool-based active learning sessi...
Yoram Baram, Ran El-Yaniv, Kobi Luz