Sciweavers

5990 search results - page 631 / 1198
» The Sampling Analysis Pattern
Sort
View
141
Voted
GECCO
2008
Springer
229views Optimization» more  GECCO 2008»
15 years 4 months ago
EIN-WUM: an AIS-based algorithm for web usage mining
With the ever expanding Web and the information published on it, effective tools for managing such data and presenting information to users based on their needs are becoming nece...
Adel Torkaman Rahmani, B. Hoda Helmi
131
Voted
DSS
2007
94views more  DSS 2007»
15 years 3 months ago
A formal modeling approach for supply chain event management
: As supply chains become more dynamic it is important to be able to model them formally as business processes. In particular, there is a need for a sense and respond capability to...
Rong Liu, Akhil Kumar, Wil M. P. van der Aalst
BIOINFORMATICS
2005
61views more  BIOINFORMATICS 2005»
15 years 3 months ago
Identification and measurement of neighbor-dependent nucleotide substitution processes
Abstract: The presence of different neighbor dependent substitution processes generates specific patterns of dinucleotide frequencies in all organisms. Based on a general framework...
Peter F. Arndt, Terence Hwa
143
Voted
CAL
2002
15 years 3 months ago
Worst-case Traffic for Oblivious Routing Functions
This paper presents an algorithm to find a worst-case traffic pattern for any oblivious routing algorithm on an arbitrary interconnection network topology. The linearity of channe...
Brian Towles, William J. Dally
97
Voted
TEC
2002
89views more  TEC 2002»
15 years 3 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta