Sciweavers

667 search results - page 83 / 134
» Exceptions for Algorithmic Skeletons
Sort
View
128
Voted
ECML
1987
Springer
15 years 6 months ago
Induction in Noisy Domains
This paper examines the induction of classification rules from examples using real-world data. Real-world data is almost always characterized by two features, which are important ...
Peter Clark, Tim Niblett
118
Voted
UAI
2000
15 years 3 months ago
A Decision Theoretic Approach to Targeted Advertising
A simple advertising strategy that can be used to help increase sales of a product is to mail out special o ers to selected potential customers. Because there is a cost associated...
David Maxwell Chickering, David Heckerman
126
Voted
NETWORKS
2006
15 years 2 months ago
The multiroute maximum flow problem revisited
We are given a directed network G = (V, A, u) with vertex set V , arc set A, a source vertex s V , a destination vertex t V , a finite capacity vector u = {uij}ijA, and a positi...
Donglei Du, R. Chandrasekaran
122
Voted
COMBINATORICS
2004
115views more  COMBINATORICS 2004»
15 years 2 months ago
Dense Packings of Equal Spheres in a Cube
We describe an adaptation of the billiard algorithm for finding dense packings of equal spheres inside a domain of the euclidean space. In order to improve the convergence of this...
Thierry Gensane
99
Voted
TKDE
2002
67views more  TKDE 2002»
15 years 2 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu