Sciweavers

2049 search results - page 129 / 410
» Normalization and Partial Evaluation
Sort
View
ICPR
2010
IEEE
14 years 1 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
DOCENG
2005
ACM
14 years 17 hour ago
Compiling XPath for streaming access policy
We show how the full XPath language can be compiled into a minimal subset suited for stream-based evaluation. Specifically, we show how XPath normalization into a core language a...
Pierre Genevès, Kristoffer Høgsbro R...
RANLP
2003
13 years 11 months ago
A framework for named entity recognition in the open domain
In this paper, a system for Named Entity Recognition in the Open domain (NERO) is described. It is concerned with recognition of various types of entity, types that will be approp...
Richard J. Evans
OSDI
1996
ACM
13 years 11 months ago
Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems
The explosive growth of the Internet, the widespread use of WWW-related applications, and the increased reliance on client-server architectures places interesting new demands on n...
Peter Druschel, Gaurav Banga
GECCO
2008
Springer
124views Optimization» more  GECCO 2008»
13 years 11 months ago
Aiming for a theoretically tractable CSA variant by means of empirical investigations
Evolution Strategies (ES) for black-box optimization of a function f : Rn → R are investigated. Namely, we consider the cumulative step-size adaptation (CSA) for the variance of...
Jens Jägersküpper, Mike Preuss