Sciweavers

988 search results - page 92 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
HPDC
1998
IEEE
15 years 2 months ago
A Fault Detection Service for Wide Area Distributed Computations
The potential for faults in distributed computing systems is a significant complicating factor for application developers. While a variety of techniques exist for detecting and co...
Paul Stelling, Ian T. Foster, Carl Kesselman, Crai...
INFOVIS
1998
IEEE
15 years 2 months ago
Similarity Clustering of Dimensions for an Enhanced Visualization of Multidimensional Data
The order and arrangement of dimensions (variates) is crucial for the effectiveness of a large number of visualization techniques such as parallel coordinates, scatterplots, recur...
Mihael Ankerst, Stefan Berchtold, Daniel A. Keim
IJCAI
2007
14 years 11 months ago
Learning to Identify Unexpected Instances in the Test Set
Traditional classification involves building a classifier using labeled training examples from a set of predefined classes and then applying the classifier to classify test instan...
Xiaoli Li, Bing Liu, See-Kiong Ng
IJMMS
2006
72views more  IJMMS 2006»
14 years 10 months ago
The use of interface agents for email notification in critical incidents
This study reports on several typical scenarios of the use of email notification interface agents under the influence of critical incidents. An interface agent is a reactive, coll...
Alexander Serenko
TASLP
2008
102views more  TASLP 2008»
14 years 9 months ago
Acoustic Source Separation of Convolutive Mixtures Based on Intensity Vector Statistics
Various techniques have previously been proposed for the separation of convolutive mixtures. These techniques can be classified as stochastic, adaptive, and deterministic. Stochast...
Banu Gunel, Hüseyin Hacihabiboglu, Ahmet M. K...