Sciweavers

950 search results - page 6 / 190
» Modified global k
Sort
View
ICPR
2004
IEEE
14 years 11 months ago
Large Scale Feature Selection Using Modified Random Mutation Hill Climbing
Feature selection is a critical component of many pattern recognition applications. There are two distinct mechanisms for feature selection, namely the wrapper method and the filt...
Anil K. Jain, Michael E. Farmer, Shweta Bapna
WCRE
2010
IEEE
13 years 9 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 9 months ago
Modified EESM Based Link Adaptation Algorithm for Multimedia Transmission in Multicarrier Systems
The previous link adaptation algorithms on ofdm based systems use equal modulation order for all sub carrier index within a block. For multimedia transmission using ofdm as the mo...
R. Sandanalakshmi, Athilakshmi, K. Manivannan
DC
2008
13 years 10 months ago
Approximate distributed top- k queries
We consider a distributed system where each node keeps a local count for items (similar to elections where nodes are ballot boxes and items are candidates). A top-k query in such ...
Boaz Patt-Shamir, Allon Shafrir
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
15 years 10 hour ago
MultiRelational k-Anonymity
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much...
Mehmet Ercan Nergiz, Chris Clifton, A. Erhan Nergi...