Sciweavers

1626 search results - page 107 / 326
» Hybrid computing algorithm in representing solid model
Sort
View
SPAA
1998
ACM
15 years 7 months ago
Analyses of Load Stealing Models Based on Differential Equations
In this paper we develop models for and analyze several randomized work stealing algorithms in a dynamic setting. Our models represent the limiting behavior of systems as the numb...
Michael Mitzenmacher
ISMIS
2005
Springer
15 years 8 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ITICSE
2004
ACM
15 years 8 months ago
Generation as method for explorative learning in computer science education
The use of generic and generative methods for the development and application of interactive educational software is a relatively unexplored area in industry and education. Advant...
Andreas Kerren
ICIP
2003
IEEE
16 years 5 months ago
Non-linear 3D rendering workload prediction based on a combined fuzzy-neural network architecture for grid computing application
Although, computational Grid has been initially developed to solve large-scale scientific research problems, it is extended for commercial and industrial applications. An interest...
John K. Doulamis, Anastasios D. Doulamis
ACL
2003
15 years 4 months ago
Generalized Algorithms for Constructing Statistical Language Models
Recent text and speech processing applications such as speech mining raise new and more general problems related to the construction of language models. We present and describe in...
Cyril Allauzen, Mehryar Mohri, Brian Roark