Sciweavers

2434 search results - page 370 / 487
» Algorithmic Randomness of Closed Sets
Sort
View
ICDM
2008
IEEE
146views Data Mining» more  ICDM 2008»
15 years 11 months ago
Isolation Forest
Most existing model-based approaches to anomaly detection construct a profile of normal instances, then identify instances that do not conform to the normal profile as anomalies...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
ADHOCNOW
2005
Springer
15 years 10 months ago
Performance Analysis of the Hierarchical Layer Graph for Wireless Networks
The Hierarchical Layer Graph (HL graph) is a promising network topology for wireless networks with variable transmission ranges. It was introduced and analyzed by Meyer auf der He...
Stefan Rührup, Christian Schindelhauer, Klaus...
CP
2003
Springer
15 years 9 months ago
Generating High Quality Schedules for a Spacecraft Memory Downlink Problem
This work introduces a combinatorial optimization problem called Mars Express Memory Dumping Problem (Mex-Mdp), which arises in the European Space Agency program Mars Express. It c...
Angelo Oddi, Nicola Policella, Amedeo Cesta, Gabri...
GECCO
2003
Springer
15 years 9 months ago
Methods for Evolving Robust Programs
Many evolutionary computation search spaces require fitness assessment through the sampling of and generalization over a large set of possible cases as input. Such spaces seem par...
Liviu Panait, Sean Luke
FGR
1998
IEEE
170views Biometrics» more  FGR 1998»
15 years 8 months ago
Feature-Point Tracking by Optical Flow Discriminates Subtle Differences in Facial Expression
Current approaches to automated analysis have focused on a small set of prototypic expressions (e.g., joy or anger). Prototypic expressions occur infrequently in everyday life, ho...
Jeffrey F. Cohn, Adena J. Zlochower, James Jenn-Ji...