Sciweavers

1042 search results - page 87 / 209
» Representing real numbers in a generalized numeration system
Sort
View
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 1 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
SIGIR
2008
ACM
15 years 1 months ago
Generalising multiple capture-recapture to non-uniform sample sizes
Algorithms in distributed information retrieval often rely on accurate knowledge of the size of a collection. The "multiple capture-recapture" method of Shokouhi et al. ...
Paul Thomas
CIKM
2009
Springer
15 years 8 months ago
SPIDER: a system for scalable, parallel / distributed evaluation of large-scale RDF data
RDF is a data model for representing labeled directed graphs, and it is used as an important building block of semantic web. Due to its flexibility and applicability, RDF has bee...
Hyunsik Choi, Jihoon Son, YongHyun Cho, Min Kyoung...
SIGMOD
2012
ACM
246views Database» more  SIGMOD 2012»
13 years 4 months ago
Skimmer: rapid scrolling of relational query results
A relational database often yields a large set of tuples as the result of a query. Users browse this result set to find the information they require. If the result set is large, ...
Manish Singh, Arnab Nandi, H. V. Jagadish
CEC
2007
IEEE
15 years 8 months ago
Finding trade-off solutions close to KKT points using evolutionary multi-objective optimization
— Despite having a wide-spread applicability of evolutionary optimization procedures over the past few decades, EA researchers still face criticism about the theoretical optimali...
Kalyanmoy Deb, Rahul Tewari, Mayur Dixit, Joydeep ...