Sciweavers

1560 search results - page 89 / 312
» Order Functions and Evaluation Codes
Sort
View
132
Voted
ISI
2007
Springer
15 years 4 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
CSC
2006
15 years 5 months ago
Statistical Analysis of Linear Random Differential Equation
In this paper, a new method is proposed in order to evaluate the stochastic solution of linear random differential equation. The method is based on the combination of the probabili...
Seifedine Kadry
GECCO
2007
Springer
235views Optimization» more  GECCO 2007»
15 years 10 months ago
Expensive optimization, uncertain environment: an EA-based solution
Real life optimization problems often require finding optimal solution to complex high dimensional, multimodal problems involving computationally very expensive fitness function e...
Maumita Bhattacharya
INFOCOM
2012
IEEE
13 years 6 months ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya
AMC
2008
157views more  AMC 2008»
15 years 4 months ago
On Popovski's method for nonlinear equations
ct 7 Two different modifications of Popovski's method are developed, both are free of second derivatives. In the first mod8 ified scheme we traded the second derivative by an ...
B. Neta