Sciweavers

2642 search results - page 96 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
KDD
2006
ACM
123views Data Mining» more  KDD 2006»
16 years 1 months ago
Mining rank-correlated sets of numerical attributes
We study the mining of interesting patterns in the presence of numerical attributes. Instead of the usual discretization methods, we propose the use of rank based measures to scor...
Toon Calders, Bart Goethals, Szymon Jaroszewicz
SIGCSE
2000
ACM
120views Education» more  SIGCSE 2000»
15 years 5 months ago
PILOT: an interactive tool for learning and grading
We describe a Web-based interactive system, called PILOT, for testing computer science concepts. The strengths of PILOT are its universal access and platform independence, its use...
Stina S. Bridgeman, Michael T. Goodrich, Stephen G...
BIRTHDAY
2006
Springer
15 years 5 months ago
Composition by Colimit and Formal Software Development
Abstract. Goguen emphasized long ago that colimits are how to compose systems [7]. This paper corroborates and elaborates Goguen's vision by presenting a variety of situations...
Douglas R. Smith
SAC
2004
ACM
15 years 7 months ago
GD-GhOST: a goal-oriented self-tuning caching algorithm
A popular solution to internet performance problems is the widespread caching of data. Many caching algorithms have been proposed in the literature, most attempting to optimize fo...
Ganesh Santhanakrishnan, Ahmed Amer, Panos K. Chry...
105
Voted
IEEEIAS
2008
IEEE
15 years 8 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...