Sciweavers

5329 search results - page 165 / 1066
» The Weighted Majority Algorithm
Sort
View
132
Voted
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 8 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
111
Voted
ICMLA
2008
15 years 4 months ago
Data Integration for Recommendation Systems
The quality of large-scale recommendation systems has been insufficient in terms of the accuracy of prediction. One of the major reasons is caused by the sparsity of the samples, ...
Zhonghang Xia, Houduo Qi, Manghui Tu, Wenke Zhang
120
Voted
QSIC
2005
IEEE
15 years 8 months ago
Stochastic Voting Algorithms for Web Services Group Testing
This paper proposes a stochastic voting for testing a large number of Web Services (WS) under group testing. In the future, a large number of WS will be available and they need to...
Wei-Tek Tsai, Dawei Zhang, Raymond A. Paul, Yinong...
TOOLS
2000
IEEE
15 years 7 months ago
Algorithmic Analysis of the Impacts of Changes to Object-Oriented Software
The research presented here addresses the problem of change impact analysis CIA for object-oriented software. A major problem for developers in an evolutionary environment is th...
Michelle Lee, A. Jefferson Offutt, Roger T. Alexan...
ICALP
2005
Springer
15 years 8 months ago
All Quantum Adversary Methods Are Equivalent
Abstract: The quantum adversary method is one of the most versatile lower-bound methods for quantum algorithms. We show that all known variants of this method are equivalent: spect...
Robert Spalek, Mario Szegedy