Sciweavers

1760 search results - page 253 / 352
» Connected Set Cover Problem and Its Applications
Sort
View
ICPP
2008
IEEE
14 years 2 months ago
Overcoming Scalability Challenges for Tool Daemon Launching
: Many tools that target parallel and distributed environments must co-locate a set of daemons with the distributed processes of the target application. However, efficient and por...
Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supins...
MLDM
2007
Springer
14 years 2 months ago
Outlier Detection with Kernel Density Functions
Abstract. Outlier detection has recently become an important problem in many industrial and financial applications. In this paper, a novel unsupervised algorithm for outlier detec...
Longin Jan Latecki, Aleksandar Lazarevic, Dragolju...
ICARIS
2004
Springer
14 years 1 months ago
Online Negative Databases
The benefits of negative detection for obscuring information are explored in the context of Artificial Immune Systems (AIS). AIS based on string matching have the potential for a...
Fernando Esponda, Elena S. Ackley, Stephanie Forre...
WABI
2004
Springer
107views Bioinformatics» more  WABI 2004»
14 years 1 months ago
Phylogenetic Super-networks from Partial Trees
—In practice, one is often faced with incomplete phylogenetic data, such as a collection of partial trees or partial splits. This paper poses the problem of inferring a phylogene...
Daniel H. Huson, Tobias Dezulian, Tobias H. Kl&oum...
NBIS
2009
Springer
14 years 13 days ago
A Security Framework for JXTA-Overlay
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...