Sciweavers

949 search results - page 138 / 190
» ISAC - Instance-Specific Algorithm Configuration
Sort
View
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 8 months ago
RDFViewS: A Storage Tuning Wizard for RDF Applications
In recent years, the significant growth of RDF data used in numerous applications has made its efficient and scalable manipulation an important issue. In this paper, we present RD...
François Goasdoué, Konstantinos Kara...
CSDA
2008
147views more  CSDA 2008»
13 years 8 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
SIAMIS
2008
116views more  SIAMIS 2008»
13 years 7 months ago
Quantitative Object Reconstruction Using Abel Transform X-Ray Tomography and Mixed Variable Optimization
This paper introduces a new approach to the problem of quantitative reconstruction of an object from few radiographic views. A mixed variable programming problem is formulated in ...
Mark A. Abramson, Thomas J. Asaki, J. E. Dennis, K...
ISI
2007
Springer
13 years 7 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
TON
2008
76views more  TON 2008»
13 years 7 months ago
Minimizing file download time in stochastic peer-to-peer networks
The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% of the Internet's bandwidth usage. Measurement studies show th...
Yuh-Ming Chiu, Do Young Eun