Sciweavers

2131 search results - page 30 / 427
» Immunity for Closed Sets
Sort
View
ASIAN
2004
Springer
69views Algorithms» more  ASIAN 2004»
14 years 4 months ago
Using Optimal Golomb Rulers for Minimizing Collisions in Closed Hashing
Abstract. We give conditions for hash table probing which minimize the expected number of collisions. A probing algorithm is determined by a sequence of numbers denoting jumps for ...
Lars Lundberg, Håkan Lennerstad, Kamilla Klo...
SLE
2009
Springer
14 years 3 months ago
Closing the Gap between Modelling and Java
Abstract. Model-Driven Software Development is based on standardised models that are refined, transformed and eventually translated into executable code using code generators. How...
Florian Heidenreich, Jendrik Johannes, Mirko Seife...
ECML
2006
Springer
14 years 2 months ago
Approximate Policy Iteration for Closed-Loop Learning of Visual Tasks
Abstract. Approximate Policy Iteration (API) is a reinforcement learning paradigm that is able to solve high-dimensional, continuous control problems. We propose to exploit API for...
Sébastien Jodogne, Cyril Briquet, Justus H....
FSS
2011
74views more  FSS 2011»
13 years 6 months ago
Ambiguous representations as fuzzy relations between sets
Crisp and L-fuzzy ambiguous representations of closed subsets of one space by closed subsets of another space are introduced. It is shown that, for each pair of compact Hausdorff ...
Oleh R. Nykyforchyn, Dusan Repovs
KDD
2005
ACM
170views Data Mining» more  KDD 2005»
14 years 11 months ago
Parallel mining of closed sequential patterns
Discovery of sequential patterns is an essential data mining task with broad applications. Among several variations of sequential patterns, closed sequential pattern is the most u...
Shengnan Cong, Jiawei Han, David A. Padua