Sciweavers

1449 search results - page 262 / 290
» Self-Randomized Exponentiation Algorithms
Sort
View
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 8 months ago
Modeling XCS in class imbalances: population size and parameter settings
This paper analyzes the scalability of the population size required in XCS to maintain niches that are infrequently activated. Facetwise models have been developed to predict the ...
Albert Orriols-Puig, David E. Goldberg, Kumara Sas...
118
Voted
ICALP
2007
Springer
15 years 8 months ago
Low Distortion Spanners
A spanner of an undirected unweighted graph is a subgraph that approximates the distance metric of the original graph with some specified accuracy. Specifically, we say H ⊆ G i...
Seth Pettie
114
Voted
ICALP
2007
Springer
15 years 8 months ago
Lower Bounds for Quantile Estimation in Random-Order and Multi-pass Streaming
We present lower bounds on the space required to estimate the quantiles of a stream of numerical values. Quantile estimation is perhaps the most studied problem in the data stream ...
Sudipto Guha, Andrew McGregor
102
Voted
SEMWEB
2007
Springer
15 years 8 months ago
Optimizing the Retrieval of Pertinent Answers for NL Questions with the E-Librarian Service
Abstract. There is a growing discrepancy between the creation of digital content and its actual employment and usefulness in a learning society. Technologies for recording lectures...
Serge Linckels, Harald Sack, Christoph Meinel
127
Voted
ACSAC
2005
IEEE
15 years 8 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...