Sciweavers

1717 search results - page 205 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
CINQ
2004
Springer
163views Database» more  CINQ 2004»
15 years 3 months ago
Frequent Itemset Discovery with SQL Using Universal Quantification
Algorithms for finding frequent itemsets fall into two broad classes: (1) algorithms that are based on non-trivial SQL statements to query and update a database, and (2) algorithms...
Ralf Rantzau
CASES
2003
ACM
15 years 3 months ago
AES and the cryptonite crypto processor
CRYPTONITE is a programmable processor tailored to the needs of crypto algorithms. The design of CRYPTONITE was based on an in-depth application analysis in which standard crypto ...
Dino Oliva, Rainer Buchty, Nevin Heintze
WSNA
2003
ACM
15 years 3 months ago
The coverage problem in a wireless sensor network
One fundamental issue in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this pr...
Chi-Fu Huang, Yu-Chee Tseng
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
15 years 2 months ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
UAI
2000
14 years 11 months ago
A Decision Theoretic Approach to Targeted Advertising
A simple advertising strategy that can be used to help increase sales of a product is to mail out special o ers to selected potential customers. Because there is a cost associated...
David Maxwell Chickering, David Heckerman