Sciweavers

1566 search results - page 194 / 314
» On a Cone Covering Problem
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 3 months ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
MST
2010
107views more  MST 2010»
15 years 2 months ago
Fixed-Parameter Algorithms for Cluster Vertex Deletion
We initiate the first systematic study of the NP-hard Cluster Vertex Deletion (CVD) problem (unweighted and weighted) in terms of fixed-parameter algorithmics. In the unweighted...
Falk Hüffner, Christian Komusiewicz, Hannes M...
ASPDAC
2010
ACM
135views Hardware» more  ASPDAC 2010»
15 years 2 months ago
Statistical timing verification for transparently latched circuits through structural graph traversal
Level-sensitive transparent latches are widely used in high-performance sequential circuit designs. Under process variations, the timing of a transparently latched circuit will ada...
Xingliang Yuan, Jia Wang
EMNLP
2010
15 years 2 months ago
Using Unknown Word Techniques to Learn Known Words
Unknown words are a hindrance to the performance of hand-crafted computational grammars of natural language. However, words with incomplete and incorrect lexical entries pose an e...
Kostadin Cholakov, Gertjan van Noord
ACIIDS
2009
IEEE
105views Database» more  ACIIDS 2009»
15 years 2 months ago
Stability Analysis of Fuzzy Control for Nonlinear Systems
In this study, we propose a method of stability analysis for a GA-Based reference ANNC capable of handling these types of problems for a nonlinear system. The initial values of the...
Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin