Sciweavers

279 search results - page 34 / 56
» A Name Abstraction Functor for Named Sets
Sort
View
CAMP
2005
IEEE
14 years 2 months ago
Bio-Inspired Computing Architectures: The Embryonics Approach
Abstract— The promise of next-generation computer technologies, such as nano-electronics, implies a number of serious alterations to the design flow of digital circuits. One of ...
Gianluca Tempesti, Daniel Mange, André Stau...
CEC
2005
IEEE
14 years 2 months ago
Constraint quadratic approximation operator for treating equality constraints with genetic algorithms
Abstract- This paper presents a new operator for genetic algorithms that enhances their convergence in the case of nonlinear problems with nonlinear equality constraints. The propo...
Elizabeth F. Wanner, Frederico G. Guimarães...
ICDE
2005
IEEE
160views Database» more  ICDE 2005»
14 years 2 months ago
NXS: Native XML processing in Sybase RDBMS
Sybase's flagship database product, Adaptive Server Enterprise provides Native XML processing (NXS) support. In this paper we present our experience related to query processi...
Anupam Singh, Srikanth Sampath, Vadiraja Bhatt, Fr...
AUSAI
2005
Springer
14 years 2 months ago
Semantic Correlation Network Based Text Clustering
Abstract. Text documents have sparse data spaces, and nearest neighbors may belong to different classes when using current existing proximity measures to describe the correlation ...
Shaoxu Song, Chunping Li
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
14 years 2 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré