Sciweavers

1088 search results - page 144 / 218
» Independence of Negative Constraints
Sort
View
SPAA
2006
ACM
15 years 4 months ago
Semi-oblivious routing
We initiate the study of semi-oblivious routing, a relaxation of oblivious routing which is first introduced by R¨acke and led to many subsequent improvements and applications. ...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, To...
68
Voted
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
15 years 3 months ago
Segmentation and Recognition of Tabla Strokes
A system that segments and labels tabla strokes from real performances is described. Performance is evaluated on a large database taken from three performers under different recor...
Parag Chordia
CIT
2004
Springer
15 years 3 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
ALT
1999
Springer
15 years 2 months ago
PAC Learning with Nasty Noise
We introduce a new model for learning in the presence of noise, which we call the Nasty Noise model. This model generalizes previously considered models of learning with noise. Th...
Nader H. Bshouty, Nadav Eiron, Eyal Kushilevitz
ICMLA
2008
14 years 11 months ago
Comparison with Parametric Optimization in Credit Card Fraud Detection
We apply five classification methods, Neural Nets(NN), Bayesian Nets(BN), Naive Bayes(NB), Artificial Immune Systems(AIS) [4] and Decision Trees(DT), to credit card fraud detectio...
Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pere...