Sciweavers

919 search results - page 112 / 184
» Improved analysis methods for crossover-based algorithms
Sort
View
116
Voted
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
16 years 22 days ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
147
Voted
RSA
2000
170views more  RSA 2000»
15 years 3 months ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski
PKDD
2009
Springer
118views Data Mining» more  PKDD 2009»
15 years 10 months ago
Sparse Kernel SVMs via Cutting-Plane Training
We explore an algorithm for training SVMs with Kernels that can represent the learned rule using arbitrary basis vectors, not just the support vectors (SVs) from the training set. ...
Thorsten Joachims, Chun-Nam John Yu
151
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Time-Varying Channel Complex Gains Estimation and ICI Suppression in OFDM Systems
—In this paper, we present an iterative algorithm for channel complex gains estimation with inter-sub-carrierinterference (ICI) reduction in orthogonal-frequency-divisionmultiple...
Hussein Hijazi, Laurent Ros
145
Voted
ASPDAC
2006
ACM
125views Hardware» more  ASPDAC 2006»
15 years 7 months ago
Efficient identification of multi-cycle false path
Due to false paths and multi-cycle paths in a circuit, using only topological delay to determine the clock period could be too conservative. In this paper, we address the timing a...
Kai Yang, Kwang-Ting Cheng