Sciweavers

3353 search results - page 110 / 671
» Laver and set theory
Sort
View
CORR
2010
Springer
149views Education» more  CORR 2010»
14 years 10 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
JACM
1998
88views more  JACM 1998»
14 years 9 months ago
A Threshold of ln n for Approximating Set Cover
Given a collection Ᏺ of subsets of S ϭ {1, . . . , n}, set cover is the problem of selecting as few as possible subsets from Ᏺ such that their union covers S, and max k-cover ...
Uriel Feige
SIAMJO
2002
99views more  SIAMJO 2002»
14 years 9 months ago
Active Sets, Nonsmoothness, and Sensitivity
Nonsmoothness pervades optimization, but the way it typically arises is highly structured. Nonsmooth behavior of an objective function is usually associated, locally, with an activ...
A. S. Lewis
ECCV
2004
Springer
15 years 11 months ago
Probabilistic Multi-view Correspondence in a Distributed Setting with No Central Server
Abstract. We present a probabilistic algorithm for finding correspondences across multiple images. The algorithm runs in a distributed setting, where each camera is attached to a s...
Shai Avidan, Yael Moses, Yoram Moses
COMPGEOM
2004
ACM
15 years 3 months ago
On empty convex polygons in a planar point set
Let P be a set of n points in general position in the plane. Let Xk(P ) denote the number of empty convex k-gons determined by P. We derive, using elementary proof techniques, sev...
Rom Pinchasi, Rados Radoicic, Micha Sharir