Sciweavers

6455 search results - page 1160 / 1291
» Research problems
Sort
View
126
Voted
CCS
2007
ACM
15 years 8 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
EGH
2003
Springer
15 years 7 months ago
Automatic shader level of detail
Current graphics hardware can render procedurally shaded objects in real-time. However, due to resource and performance limitations, interactive shaders can not yet approach the c...
Marc Olano, Bob Kuehne, Maryann Simmons
STOC
2010
ACM
204views Algorithms» more  STOC 2010»
15 years 7 months ago
Interactive privacy via the median mechanism
We define a new interactive differentially private mechanism — the median mechanism — for answering arbitrary predicate queries that arrive online. Given fixed accuracy and...
Aaron Roth, Tim Roughgarden
AI
2000
Springer
15 years 6 months ago
Keep It Simple: A Case-Base Maintenance Policy Based on Clustering and Information Theory
Abstract. Today’s case based reasoning applications face several challenges. In a typical application, the case bases grow at a very fast rate and their contents become increasin...
Qiang Yang, Jing Wu
121
Voted
USENIX
1994
15 years 3 months ago
Splicing UNIX into a Genome Mapping Laboratory
The Whitehead Institute/MIT Center for Genome Research is responsible for a number of large genome mapping efforts, the scale of which create problems of data and workflow managem...
Lincoln Stein, Andre Marquis, Robert Dredge, Mary ...
« Prev « First page 1160 / 1291 Last » Next »