Sciweavers

7015 search results - page 1114 / 1403
» Approximation algorithms for co-clustering
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 8 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 8 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
130
Voted
IPPS
1997
IEEE
15 years 8 months ago
Performance Analysis and Optimization on a Parallel Atmospheric General Circulation Model Code
An analysis is presented of the primary factors influencing the performance of a parallel implementation of the UCLA atmospheric general circulation model (AGCM) on distributedme...
John Z. Lou, John D. Farrara
IPPS
1996
IEEE
15 years 8 months ago
The Chessboard Distance Transform and the Medial Axis Transform are Interchangeable
The distance transform (DT) and the medial axis transform (MAT) are two image computation tools used to extract the information about the shape and the position of the foreground ...
Yu-Hua Lee, Shi-Jinn Horng
ECML
1993
Springer
15 years 8 months ago
Complexity Dimensions and Learnability
In machine learning theory, problem classes are distinguished because of di erences in complexity. In 6 , a stochastic model of learning from examples was introduced. This PAClear...
Shan-Hwei Nienhuys-Cheng, Mark Polman
« Prev « First page 1114 / 1403 Last » Next »