Sciweavers

14386 search results - page 2743 / 2878
» The Chinese Generals Problem
Sort
View
SOUPS
2010
ACM
14 years 2 days ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
14 years 2 days ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
14 years 2 days ago
Controlling overfitting with multi-objective support vector machines
Recently, evolutionary computation has been successfully integrated into statistical learning methods. A Support Vector Machine (SVM) using evolution strategies for its optimizati...
Ingo Mierswa
EDBT
2009
ACM
134views Database» more  EDBT 2009»
14 years 2 days ago
Caching content-based queries for robust and efficient image retrieval
In order to become an effective complement to traditional Web-scale text-based image retrieval solutions, content-based image retrieval must address scalability and efficiency iss...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 2 days ago
Efficient top-k count queries over imprecise duplicates
We propose efficient techniques for processing various TopK count queries on data with noisy duplicates. Our method differs from existing work on duplicate elimination in two sign...
Sunita Sarawagi, Vinay S. Deshpande, Sourabh Kasli...
« Prev « First page 2743 / 2878 Last » Next »