Sciweavers

1403 search results - page 93 / 281
» Set cover algorithms for very large datasets
Sort
View
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
15 years 10 months ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
15 years 11 months ago
Rule Ensembles for Multi-target Regression
—Methods for learning decision rules are being successfully applied to many problem domains, especially where understanding and interpretation of the learned model is necessary. ...
Timo Aho, Bernard Zenko, Saso Dzeroski
PODS
2005
ACM
131views Database» more  PODS 2005»
16 years 4 months ago
Buffering in query evaluation over XML streams
All known algorithms for evaluating advanced XPath queries (e.g., ones with predicates or with closure axes) on XML streams employ buffers to temporarily store fragments of the do...
Ziv Bar-Yossef, Marcus Fontoura, Vanja Josifovski
ACIVS
2007
Springer
15 years 8 months ago
Patch-Based Experiments with Object Classification in Video Surveillance
We present a patch-based algorithm for the purpose of object classification in video surveillance. Within detected regions-of-interest (ROIs) of moving objects in the scene, a feat...
Rob G. J. Wijnhoven, Peter H. N. de With
IPPS
2010
IEEE
15 years 2 months ago
On the importance of bandwidth control mechanisms for scheduling on large scale heterogeneous platforms
We study three scheduling problems (file redistribution, independent tasks scheduling and broadcasting) on large scale heterogeneous platforms under the Bounded Multi-port Model. I...
Olivier Beaumont, Hejer Rejeb