Sciweavers

17288 search results - page 3261 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
APPINF
2003
15 years 5 months ago
Extracting High-level Architecture from Existing Code with Summary Models
Evolution of existing large telecommunications software currently became an important issue. Efficient methods are needed to componentize existing software identify existing compo...
Nikolai Mansurov, Djenana Campara
ICWN
2004
15 years 5 months ago
Energy-Efficient Graphical User Interface Design
Mobile computers, such as cell phones and personal digital assistants (PDAs), have dramatically increased in sophistication. At the same time, the desire of consumers for portabili...
Keith S. Vallerio, Lin Zhong, Niraj K. Jha
FLAIRS
2003
15 years 5 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
NIPS
2004
15 years 5 months ago
Spike Sorting: Bayesian Clustering of Non-Stationary Data
Spike sorting involves clustering spike trains recorded by a microelectrode according to the source neuron. It is a complicated problem, which requires a lot of human labor, partl...
Aharon Bar-Hillel, Adam Spiro, Eran Stark
IJCAI
2003
15 years 5 months ago
Describing and Utilizing Constraints to Answer Queries in Data-Integration Systems
In data-integration systems, information sources often have various constraints such as “all houses stored at a source have a unique address.” These constraints are very usefu...
Chen Li
« Prev « First page 3261 / 3458 Last » Next »