Sciweavers

805 search results - page 147 / 161
» Enumerating All Solutions for Constraint Satisfaction Proble...
Sort
View
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 8 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
CADE
2006
Springer
14 years 8 months ago
Stratified Context Unification Is NP-Complete
Context Unification is the problem to decide for a given set of second-order equations E where all second-order variables are unary, whether there exists a unifier, such that for e...
Jordi Levy, Manfred Schmidt-Schauß, Mateu Vi...
ICWS
2009
IEEE
14 years 5 months ago
Towards Probabilistic Estimation of Quality of Online Services
Accurate estimation of quality of online services is both an important and difficult problem, since a service has many interdependent quality attributes influenced by several co...
Le-Hung Vu, Karl Aberer
IROS
2007
IEEE
266views Robotics» more  IROS 2007»
14 years 2 months ago
Incremental multi-robot task selection for resource constrained and interrelated tasks
— When the tasks of a mission are interrelated and subject to several resource constraints, more efforts are needed to coordinate robots towards achieving the mission than indepe...
Sanem Sariel, Tucker R. Balch, Nadia Erdogan
CAAN
2004
Springer
14 years 1 months ago
Bandwidth Allocation in Networks: A Single Dual Update Subroutine for Multiple Objectives
We study the bandwidth allocation problem Maximize U(x), subject to Ax ≤ c; x ≥ 0 where U is a utility function, x is a bandwidth allocation vector, and Ax ≤ c represent the...
Sung-woo Cho, Ashish Goel