Sciweavers

1560 search results - page 89 / 312
» Order Functions and Evaluation Codes
Sort
View
ISI
2007
Springer
13 years 10 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
CSC
2006
13 years 11 months ago
Statistical Analysis of Linear Random Differential Equation
In this paper, a new method is proposed in order to evaluate the stochastic solution of linear random differential equation. The method is based on the combination of the probabili...
Seifedine Kadry
GECCO
2007
Springer
235views Optimization» more  GECCO 2007»
14 years 4 months ago
Expensive optimization, uncertain environment: an EA-based solution
Real life optimization problems often require finding optimal solution to complex high dimensional, multimodal problems involving computationally very expensive fitness function e...
Maumita Bhattacharya
INFOCOM
2012
IEEE
12 years 14 days ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya
AMC
2008
157views more  AMC 2008»
13 years 10 months ago
On Popovski's method for nonlinear equations
ct 7 Two different modifications of Popovski's method are developed, both are free of second derivatives. In the first mod8 ified scheme we traded the second derivative by an ...
B. Neta