Sciweavers

391 search results - page 30 / 79
» Evaluation of Length-Lex Set Variables
Sort
View
IPPS
2008
IEEE
14 years 5 months ago
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm
—In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring vari...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
GECCO
2009
Springer
107views Optimization» more  GECCO 2009»
14 years 3 months ago
A stigmergy-based algorithm for black-box optimization: noisy function testbed
In this paper, we present a stigmergy-based algorithm for solving optimization problems with continuous variables, labeled Differential Ant-Stigmergy Algorithm (DASA). The perfor...
Peter Korosec, Jurij Silc
JMLR
2010
134views more  JMLR 2010»
13 years 5 months ago
Bayesian Algorithms for Causal Data Mining
We present two Bayesian algorithms CD-B and CD-H for discovering unconfounded cause and effect relationships from observational data without assuming causal sufficiency which prec...
Subramani Mani, Constantin F. Aliferis, Alexander ...
BMCBI
2011
13 years 2 months ago
To aggregate or not to aggregate high-dimensional classifiers
Background: High-throughput functional genomics technologies generate large amount of data with hundreds or thousands of measurements per sample. The number of sample is usually m...
Cheng-Jian Xu, Huub C. J. Hoefsloot, Age K. Smilde
CN
2004
100views more  CN 2004»
13 years 10 months ago
Study of long-duration MPEG-trace segmentation methods for developing frame-size-based traffic models
Texture and temporal variations in scenes, and peculiarities of MPEG compression algorithms result in very complex frame-size data sets for any long-duration variable bit rate (VB...
Uttam K. Sarkar, Subramanian Ramakrishnan, Dilip S...