Sciweavers

2905 search results - page 245 / 581
» Formal Memetic Algorithms
Sort
View
ICCCN
2008
IEEE
15 years 5 months ago
A Position-Based Deployment and Routing Approach for Directional Wireless Mesh Networks
—Observing that simplicity implies efficiency and scalability, this paper proposes a position-based deployment and routing strategy, and then gives a concrete approach under this...
Weisheng Si, Selvakennedy Selvadurai
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
15 years 5 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley
73
Voted
ICDM
2008
IEEE
128views Data Mining» more  ICDM 2008»
15 years 5 months ago
Cost-Sensitive Parsimonious Linear Regression
We examine linear regression problems where some features may only be observable at a cost (e.g., in medical domains where features may correspond to diagnostic tests that take ti...
Robby Goetschalckx, Kurt Driessens, Scott Sanner
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
15 years 5 months ago
Cross-Mining Binary and Numerical Attributes
We consider the problem of relating itemsets mined on binary attributes of a data set to numerical attributes of the same data. An example is biogeographical data, where the numer...
Gemma C. Garriga, Hannes Heikinheimo, Jouni K. Sep...
RTAS
2007
IEEE
15 years 5 months ago
Resource-Locking Durations in EDF-Scheduled Systems
The duration of time for which each application locks each shared resource is critically important in composing multiple independently-developed applications upon a shared “open...
Nathan Fisher, Marko Bertogna, Sanjoy K. Baruah