Sciweavers

1209 search results - page 113 / 242
» Approximation by pseudo-linear operators
Sort
View
ICARIS
2007
Springer
15 years 8 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq
FATES
2006
Springer
15 years 8 months ago
Dynamic Architecture Extraction
Abstract. Object models capture key properties of object-oriented architectures, and they can highlight relationships between types, occurrences of sharing, and object encapsulatio...
Cormac Flanagan, Stephen N. Freund
KDD
2000
ACM
168views Data Mining» more  KDD 2000»
15 years 8 months ago
Scaling up dynamic time warping for datamining applications
There has been much recent interest in adapting data mining algorithms to time series databases. Most of these algorithms need to compare time series. Typically some variation of ...
Eamonn J. Keogh, Michael J. Pazzani
SAS
2000
Springer
15 years 8 months ago
Flattening Is an Improvement
d Abstract) James Riely1 and Jan Prins2 1 DePaul University 2 University of North Carolina at Chapel Hill Abstract. Flattening is a program transformation that eliminates nested pa...
James Riely, Jan Prins
STACS
2000
Springer
15 years 8 months ago
Multi-linearity Self-Testing with Relative Error
We investigate self-testing programs with relative error by allowing error terms proportional to the function to be computed. Until now, in numerical computation, error terms were ...
Frédéric Magniez