Sciweavers

331 search results - page 55 / 67
» Vicinal Risk Minimization
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
On-line consistent backup in transactional file systems
A consistent backup, preserving data integrity across files in a file system, is of utmost importance for the purpose of correctness and minimizing system downtime during the proc...
Lipika Deka, Gautam Barua
EOR
2008
70views more  EOR 2008»
13 years 7 months ago
Robust portfolio selection based on a multi-stage scenario tree
The aim of this paper is to apply the concept of robust optimization introduced by Bel-Tal and Nemirovski to the portfolio selection problems based on multi-stage scenario trees. ...
Ruijun Shen, Shuzhong Zhang
ESE
2008
112views Database» more  ESE 2008»
13 years 7 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
JIFS
2006
120views more  JIFS 2006»
13 years 7 months ago
Building similarity metrics reflecting utility in case-based reasoning
Fundamental to case-based reasoning is the idea that similar problems have similar solutions. The meaning of the concept of "similarity" can vary in different situations...
Ning Xiong, Peter Funk
ENVSOFT
2007
258views more  ENVSOFT 2007»
13 years 7 months ago
Optimal groundwater monitoring design using an ant colony optimization paradigm
Groundwater long-term monitoring (LTM) is required to assess the performance of groundwater remediation and human being health risk at post-closure sites where groundwater contami...
Yuanhai Li, Amy B. Chan Hilton