Sciweavers

709 search results - page 83 / 142
» Real-World Limits to Algorithmic Intelligence
Sort
View
CIDM
2009
IEEE
15 years 11 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
INFOCOM
2009
IEEE
15 years 11 months ago
Locally vs. Globally Optimized Flow-Based Content Distribution to Mobile Nodes
—The paper deals with efficient distribution of timely information to flows of mobile devices. We consider the case where a set of Information Dissemination Devices (IDDs) broa...
Mhameed Aezladen, Reuven Cohen, Danny Raz
ICTAI
2008
IEEE
15 years 10 months ago
Knee Point Detection on Bayesian Information Criterion
The main challenge of cluster analysis is that the number of clusters or the number of model parameters is seldom known, and it must therefore be determined before clustering. Bay...
Qinpei Zhao, Mantao Xu, Pasi Fränti
AE
2007
Springer
15 years 10 months ago
Minimal and Necessary Conditions for the Emergence of Species-Specific Recognition Patterns
A simple mechanism is presented for the emergence of recognition patterns that are used by individuals to find each other and mate. The genetic component determines the brain of an...
Nicolas Brodu
EVOW
2007
Springer
15 years 10 months ago
A Hybrid Method for Solving Large-Scale Supply Chain Problems
Abstract. The strategic supply chain design problem which allows capacity shifts and budget limitations can be formulated as a linear program. Since facilities are allowed to be op...
Steffen Wolf, Peter Merz