Sciweavers

71 search results - page 13 / 15
» Rule learning with monotonicity constraints
Sort
View
FUN
2010
Springer
230views Algorithms» more  FUN 2010»
14 years 1 months ago
Scheduling with Bully Selfish Jobs
In job scheduling with precedence constraints, i j means that job j cannot start being processed before job i is completed. In this paper we consider selfish bully jobs who do no...
Tami Tamir
ACL
1998
13 years 11 months ago
A Generative Lexicon Perspective for Adjectival Modification
This paper presents a semantic interpretation of adjectival modification in terms of the Generative Lexicon. It highlights the elements which can be borrowed from the GL and devel...
Patrick Saint-Dizier
ATAL
2007
Springer
14 years 4 months ago
Interactions between market barriers and communication networks in marketing systems
We investigate a framework where agents search for satisfying products by using referrals from other agents. Our model of a mechanism for transmitting word-of-mouth and the result...
Ian N. Durbach, Jan H. Hofmeyr
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 2 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
FUIN
2007
147views more  FUIN 2007»
13 years 9 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng