Sciweavers

1809 search results - page 128 / 362
» Weakly Computable Real Numbers
Sort
View
ISIPTA
1999
IEEE
116views Mathematics» more  ISIPTA 1999»
15 years 8 months ago
On the Distribution of Natural Probability Functions
The purpose of this note is to describe the underlying insights and results obtained by the authors, and others, in a series of papers aimed at modelling the distribution of `natu...
Jeff B. Paris, Paul N. Watton, George M. Wilmers
ICDM
2009
IEEE
152views Data Mining» more  ICDM 2009»
15 years 2 months ago
A Sparsification Approach for Temporal Graphical Model Decomposition
Temporal causal modeling can be used to recover the causal structure among a group of relevant time series variables. Several methods have been developed to explicitly construct te...
Ning Ruan, Ruoming Jin, Victor E. Lee, Kun Huang
ICML
2007
IEEE
16 years 5 months ago
Asymmetric boosting
A cost-sensitive extension of boosting, denoted as asymmetric boosting, is presented. Unlike previous proposals, the new algorithm is derived from sound decision-theoretic princip...
Hamed Masnadi-Shirazi, Nuno Vasconcelos
VLDB
2005
ACM
93views Database» more  VLDB 2005»
15 years 9 months ago
The TEXTURE Benchmark: Measuring Performance of Text Queries on a Relational DBMS
We introduce a benchmark called TEXTURE (TEXT Under RElations) to measure the relative strengths and weaknesses of combining text processing with a relational workload in an RDBMS...
Vuk Ercegovac, David J. DeWitt, Raghu Ramakrishnan
IMC
2004
ACM
15 years 9 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford