Sciweavers

5615 search results - page 1029 / 1123
» On the Computational Capabilities of Several Models
Sort
View
WM
2003
14 years 11 months ago
The differentia principle as a cornerstone of ontology
The Information Society relies more and more on the co-operation and collaboration of multidisciplinary people who need to communicate and share information. Communication and kno...
Christophe Spies
WORM
2003
14 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
COR
2010
164views more  COR 2010»
14 years 10 months ago
The distributed permutation flowshop scheduling problem
This paper studies a new generalization of the regular permutation flowshop scheduling problem (PFSP) referred to as the distributed permutation flowshop scheduling problem or DPF...
B. Naderi, Rubén Ruiz
CORR
2010
Springer
167views Education» more  CORR 2010»
14 years 10 months ago
Network Flow Algorithms for Structured Sparsity
We consider a class of learning problems that involve a structured sparsityinducing norm defined as the sum of -norms over groups of variables. Whereas a lot of effort has been pu...
Julien Mairal, Rodolphe Jenatton, Guillaume Obozin...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 10 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
« Prev « First page 1029 / 1123 Last » Next »