Sciweavers

801 search results - page 133 / 161
» Minimal Locked Trees
Sort
View
AUSDM
2006
Springer
110views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Discovering Debtor Patterns of Centrelink Customers
Data mining is currently becoming an increasingly hot research field, but a large gap still remains between the research of data mining and its application in real-world business....
Yanchang Zhao, Longbing Cao, Yvonne Morrow, Yuming...
EDBT
2000
ACM
15 years 1 months ago
Navigation-Driven Evaluation of Virtual Mediated Views
The MIX mediator systems incorporates a novel framework for navigation-driven evaluation of virtual mediated views. Its architecture allows the on-demand computation of views and q...
Bertram Ludäscher, Yannis Papakonstantinou, P...
96
Voted
WIA
2000
Springer
15 years 1 months ago
MONA Implementation Secrets
The Mona tool provides an implementation of the decision procedures for the logics WS1S and WS2S. It has been used for numerous applications, and it is remarkably efficient in prac...
Nils Klarlund, Anders Møller, Michael I. Sc...
GECCO
2010
Springer
169views Optimization» more  GECCO 2010»
15 years 1 months ago
Robust symbolic regression with affine arithmetic
We use affine arithmetic to improve both the performance and the robustness of genetic programming for symbolic regression. During evolution, we use affine arithmetic to analyze e...
Cassio Pennachin, Moshe Looks, João A. de V...
COMPSAC
2005
IEEE
14 years 11 months ago
A Low-Latency Checkpointing Scheme for Mobile Computing Systems
Fault-tolerant mobile computing systems have different requirements and restrictions, not taken into account by conventional distributed systems. This paper presents a coordinate...
Guohui Li, LihChyun Shu