Sciweavers

571 search results - page 34 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
119
Voted
IPPS
2010
IEEE
15 years 16 days ago
A scalable algorithm for maintaining perpetual system connectivity in dynamic distributed systems
We investigate the problem of maintaining a topology with small degree as well as small diameter in a dynamic distributed system such that the system always stays connected and pr...
Tarun Bansal, Neeraj Mittal
134
Voted
JCIT
2010
158views more  JCIT 2010»
14 years 9 months ago
A Flexible Grid Task Scheduling Algorithm Based on QoS Similarity
s In grid computing, the goals of task scheduling is to achieve high system optimization performance while matching multi-dimension Quiality of Service(QoS) requirement of applicat...
Kunfang Song, Shufen Ruan, Minghua Jiang
136
Voted
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
15 years 8 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
170
Voted
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
15 years 4 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
135
Voted
EC
2007
101views ECommerce» more  EC 2007»
15 years 2 months ago
Revisiting Negative Selection Algorithms
This paper reviews the progress of negative selection algorithms, an anomaly/change detection approach in Artificial Immune Systems (AIS). Following its initial model, we try to ...
Zhou Ji, Dipankar Dasgupta