Sciweavers

1845 search results - page 364 / 369
» Computing the Angularity Tolerance
Sort
View
KDD
2010
ACM
224views Data Mining» more  KDD 2010»
13 years 11 months ago
Ensemble pruning via individual contribution ordering
An ensemble is a set of learned models that make decisions collectively. Although an ensemble is usually more accurate than a single learner, existing ensemble methods often tend ...
Zhenyu Lu, Xindong Wu, Xingquan Zhu, Josh Bongard
NGC
2000
Springer
13 years 11 months ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
ATAL
2008
Springer
13 years 9 months ago
WADE: a software platform to develop mission critical applications exploiting agents and workflows
In this paper, we describe two mission critical applications currently deployed by Telecom Italia in the Operations Support System domains. The first one called "Network Neut...
Giovanni Caire, Danilo Gotta, Massimo Banzi
FTCS
1997
115views more  FTCS 1997»
13 years 8 months ago
Robust Emulation of Shared Memory Using Dynamic Quorum-Acknowledged Broadcasts
This paper presents robust emulation of multi-writer/multi-reader registers in message-passing systems using dynamic quorum con gurations. In addition to processor and link failur...
Nancy A. Lynch, Alexander A. Shvartsman
ATMN
1993
13 years 8 months ago
Local Allocation of End-to-End Quality-of-Service in High-Speed Networks
Quality-of-service (QOS) requirements for applications in high-speed networks are typically specied on an end-to-end basis. Mapping this end-to-end requirement to nodal requiremen...
Ramesh Nagarajan, James F. Kurose, Donald F. Towsl...