Sciweavers

3544 search results - page 165 / 709
» Online Computation with Advice
Sort
View
AINA
2004
IEEE
15 years 4 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
112
Voted
ITICSE
2010
ACM
15 years 4 months ago
Helping students build a mental model of computation
Introductory computer science classes are known for having a high attrition rate. Some authors believe this is due to students’ difficulties in establishing a mental model of co...
Steve Kollmansberger
110
Voted
ARITH
2003
IEEE
15 years 6 months ago
High-Radix Iterative Algorithm for Powering Computation
A high-radix composite algorithm for the computation of the powering function (¤¦¥ ) is presented in this paper. The algorithm consists of a sequence of overlapped operations: ...
José-Alejandro Piñeiro, Milos D. Erc...
PC
2007
119views Management» more  PC 2007»
15 years 6 days ago
Brokering strategies in computational grids using stochastic prediction models
In this paper we propose a new routing policy to route jobs to clusters in computational grids. This routing policy is based on index tables computed at each cluster. These tables...
Vandy Berten, Bruno Gaujal
115
Voted
ICAIL
2005
ACM
15 years 6 months ago
Computational Law
Computational law is an approach to automated legal reasoning focusing on semantically rich laws, regulations, contract terms, and business rules in the context of electronicallym...
Nathaniel Love, Michael R. Genesereth