Sciweavers

3482 search results - page 134 / 697
» In Praise of Numerical Computation
Sort
View
92
Voted
PIMRC
2008
IEEE
15 years 7 months ago
Network-Assisted Wireless Computing
Abstract—Multimedia applications for mobile devices are increasing and growing more sophisticated. Many of these applications require computationally intensive processing, such a...
Carri W. Chan, Nicholas Bambos, Jatinder Pal Singh
110
Voted
IJCNN
2006
IEEE
15 years 6 months ago
Small-catchment flood forecasting and drainage network extraction using computational intelligence
— Forecast, detection and warning of severe weather and related hydro-geological risks is becoming one of the major issues for civil protection. The use of computational intellig...
Erika Coppola, Barbara Tomassetti, Marco Verdecchi...
FOCS
2000
IEEE
15 years 5 months ago
Stable Distributions, Pseudorandom Generators, Embeddings and Data Stream Computation
In this article, we show several results obtained by combining the use of stable distributions with pseudorandom generators for bounded space. In particular: —We show that, for a...
Piotr Indyk
118
Voted
KDD
2000
ACM
97views Data Mining» more  KDD 2000»
15 years 4 months ago
Towards an effective cooperation of the user and the computer for classification
Decision trees have been successfully used for the task of classification. However, state-of-the-art algorithms do not incorporate the user in the tree construction process. This ...
Mihael Ankerst, Martin Ester, Hans-Peter Kriegel
115
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 21 days ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi