Sciweavers

1449 search results - page 262 / 290
» Self-Randomized Exponentiation Algorithms
Sort
View
141
Voted
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 11 months ago
Modeling XCS in class imbalances: population size and parameter settings
This paper analyzes the scalability of the population size required in XCS to maintain niches that are infrequently activated. Facetwise models have been developed to predict the ...
Albert Orriols-Puig, David E. Goldberg, Kumara Sas...
ICALP
2007
Springer
15 years 11 months ago
Low Distortion Spanners
A spanner of an undirected unweighted graph is a subgraph that approximates the distance metric of the original graph with some specified accuracy. Specifically, we say H ⊆ G i...
Seth Pettie
ICALP
2007
Springer
15 years 11 months ago
Lower Bounds for Quantile Estimation in Random-Order and Multi-pass Streaming
We present lower bounds on the space required to estimate the quantiles of a stream of numerical values. Quantile estimation is perhaps the most studied problem in the data stream ...
Sudipto Guha, Andrew McGregor
SEMWEB
2007
Springer
15 years 11 months ago
Optimizing the Retrieval of Pertinent Answers for NL Questions with the E-Librarian Service
Abstract. There is a growing discrepancy between the creation of digital content and its actual employment and usefulness in a learning society. Technologies for recording lectures...
Serge Linckels, Harald Sack, Christoph Meinel
ACSAC
2005
IEEE
15 years 10 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...