Sciweavers

2988 search results - page 342 / 598
» Experiments with a New Boosting Algorithm
Sort
View
CAISE
2003
Springer
15 years 8 months ago
Extending an on-line information site with accurate domain-dependent extracts from the World Wide Web
This paper describes a new procedure that has been developed for extending an existing on-line information system about The Voyages of the Beagle with information collected automat...
Enrique Alfonseca, Pilar Rodríguez
CP
2003
Springer
15 years 8 months ago
Box Constraint Collections for Adhoc Constraints
In this paper, we propose a new language-independent representation of adhoc constraints, called a box constraint collection. Using constructive disjunction, this representation ac...
Chi Kan Cheng, Jimmy Ho-Man Lee, Peter J. Stuckey
116
Voted
IFL
2003
Springer
128views Formal Methods» more  IFL 2003»
15 years 8 months ago
With-Loop Scalarization - Merging Nested Array Operations
Construction of complex array operations by composition of more basic ones allows for abstract and concise specifications of algorithms. Unfortunately, na¨ıve compilation of suc...
Clemens Grelck, Sven-Bodo Scholz, Kai Trojahner
DATE
2002
IEEE
79views Hardware» more  DATE 2002»
15 years 8 months ago
Incremental Diagnosis and Correction of Multiple Faults and Errors
An incremental simulation-based approach to fault diagnosis and logic debugging is presented. During each iteration of the algorithm, a single suspicious location is identified a...
Andreas G. Veneris, Jiang Brandon Liu, Mandana Ami...
DSN
2002
IEEE
15 years 8 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend