Sciweavers

536 search results - page 33 / 108
» Evaluating Metrical Phonology - a Computational- Empirical A...
Sort
View
CN
2007
80views more  CN 2007»
14 years 11 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
HPDC
2010
IEEE
15 years 25 days ago
A hybrid Markov chain model for workload on parallel computers
This paper proposes a comprehensive modeling architecture for workloads on parallel computers using Markov chains in combination with state dependent empirical distribution functi...
Anne Krampe, Joachim Lepping, Wiebke Sieben
DIS
2009
Springer
15 years 6 months ago
Subspace Discovery for Promotion: A Cell Clustering Approach
The promotion analysis problem has been proposed in [16], where ranking-based promotion query processing techniques are studied to effectively and efficiently promote a given obje...
Tianyi Wu, Jiawei Han
PKDD
2010
Springer
158views Data Mining» more  PKDD 2010»
14 years 10 months ago
Learning Sparse Gaussian Markov Networks Using a Greedy Coordinate Ascent Approach
In this paper, we introduce a simple but efficient greedy algorithm, called SINCO, for the Sparse INverse COvariance selection problem, which is equivalent to learning a sparse Ga...
Katya Scheinberg, Irina Rish
DATE
2010
IEEE
261views Hardware» more  DATE 2010»
15 years 4 months ago
Evaluation and design exploration of solar harvested-energy prediction algorithm
Abstract—To respond to variations in solar energy, harvestedenergy prediction is essential to harvested-energy management approaches. The effectiveness of such approaches is depe...
Mustafa Imran Ali, Bashir M. Al-Hashimi, Joaqu&iac...