Sciweavers

761 search results - page 53 / 153
» Concise and Consistent Naming
Sort
View
EPIA
2005
Springer
14 years 3 months ago
User Group Profile Modeling Based on User Transactional Data for Personalized Systems
In this paper, we propose a framework named UMT (User-profile Modeling based on Transactional data) for modeling user group profiles based on the transactional data. UMT is a gener...
Yiling Yang, Nuno C. Marques
GECCO
2005
Springer
109views Optimization» more  GECCO 2005»
14 years 3 months ago
A hybrid evolutionary algorithm for the p-median problem
A hybrid evolutionary algorithm (EA) for the p-median problem consist of two stages, each of which is a steady-state hybrid EA. These EAs encode selections of medians as subsets o...
István Borgulya
ISMIS
2005
Springer
14 years 3 months ago
Bitmap Index-Based Decision Trees
In this paper we propose an original approach to apply data mining algorithms, namely decision tree-based methods, taking into account not only the size of processed databases but ...
Cécile Favre, Fadila Bentayeb
ISPA
2005
Springer
14 years 3 months ago
ER-TCP: An Efficient Fault-Tolerance Scheme for TCP Connections
Abstract. This paper proposes a novel scheme, named ER-TCP, which transparently masks the failures happened on the server nodes in a cluster from clients at TCP connection granular...
Zhiyuan Shao, Hai Jin, Bin Cheng, Wenbin Jiang
MYCRYPT
2005
Springer
187views Cryptology» more  MYCRYPT 2005»
14 years 3 months ago
Distinguishing Attacks on T-Functions
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function an...
Simon Künzli 0002, Pascal Junod, Willi Meier