Sciweavers

501 search results - page 7 / 101
» Redundancy and Diversity in Security
Sort
View
INFOCOM
2003
IEEE
14 years 2 months ago
Path Diversity with Forward Error Correction (PDF) System for Delay Sensitive Applications over the Internet
— Packet loss and end-to-end delay limit delay sensitive applications over the best effort packet switched networks such as the Internet. In our previous work, we have shown that...
Thinh Nguyen
DMIN
2006
158views Data Mining» more  DMIN 2006»
13 years 10 months ago
Ensemble Selection Using Diversity Networks
- An ideal ensemble is composed of base classifiers that perform well and that have minimal overlap in their errors. Eliminating classifiers from an ensemble based on a criterion t...
Qiang Ye, Paul W. Munro
ICTIR
2009
Springer
13 years 6 months ago
An Analysis of NP-Completeness in Novelty and Diversity Ranking
Abstract. A useful ability for search engines is to be able to rank objects with novelty and diversity: the top k documents retrieved should cover possible interpretations of a que...
Ben Carterette
GECCO
2004
Springer
140views Optimization» more  GECCO 2004»
14 years 2 months ago
Keeping the Diversity with Small Populations Using Logic-Based Genetic Programming
We present a new method of Logic-Based Genetic Programming (LBGP). Using the intrinsic mechanism of backtracking in Prolog, we utilize large individual programs with redundant clau...
Ken Taniguchi, Takao Terano
CCGRID
2006
IEEE
14 years 3 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood