Sciweavers

5344 search results - page 246 / 1069
» Privacy-Preserving Set Operations
Sort
View
IFIP
2010
Springer
15 years 5 months ago
The Network Data Handling War: MySQL vs. NfDump
Abstract. Network monitoring plays a crucial role in any network management environment. Especially nowadays, with network speed and load constantly increasing, more and more data ...
Rick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko ...
ADMA
2006
Springer
153views Data Mining» more  ADMA 2006»
15 years 5 months ago
An Effective Combination Based on Class-Wise Expertise of Diverse Classifiers for Predictive Toxicology Data Mining
This paper presents a study on the combination of different classifiers for toxicity prediction. Two combination operators for the Multiple-Classifier System definition are also pr...
Daniel Neagu, Gongde Guo, Shanshan Wang
DAGSTUHL
2007
15 years 5 months ago
Propositional Relevance through Letter-Sharing: Review and Contribution
The concept of relevance between classical propositional formulae, defined in terms of letter-sharing, has been around for a very long time. But it began to take on a fresh life i...
David Makinson
DAGSTUHL
2006
15 years 5 months ago
On Complexity of Optimized Crossover for Binary Representations
We consider the computational complexity of producing the best possible offspring in a crossover, given two solutions of the parents. The crossover operators are studied on the cla...
Anton V. Eremeev
NIPS
1997
15 years 5 months ago
Mapping a Manifold of Perceptual Observations
Nonlinear dimensionality reduction is formulated here as the problem of trying to find a Euclidean feature-space embedding of a set of observations that preserves as closely as p...
Joshua B. Tenenbaum