Sciweavers

2165 search results - page 112 / 433
» cases 2005
Sort
View
ESA
2005
Springer
162views Algorithms» more  ESA 2005»
15 years 9 months ago
Negative Cycle Detection Problem
In this paper, we will describe some heuristics that can be used to improve the runtime of a wide range of commonly used algorithms for the negative cycle detection problem signi...
Chi-Him Wong, Yiu-Cheong Tam
140
Voted
ICTAC
2005
Springer
15 years 9 months ago
The Timer Cascade: Functional Modelling and Real Time Calculi
Case studies can significantly contribute towards improving the understanding of formalisms and thereby to their applicability in practice. One such case, namely a cascade of the ...
Raymond T. Boute, Andreas Schäfer
147
Voted
IPSN
2005
Springer
15 years 9 months ago
Lossy network correlated data gathering with high-resolution coding
— We consider a sensor network measuring correlated data, where the task is to gather all data from the network nodes to a sink. We consider the case where data at nodes is lossy...
Razvan Cristescu, Baltasar Beferull-Lozano
ISAAC
2005
Springer
120views Algorithms» more  ISAAC 2005»
15 years 9 months ago
Improved Algorithms for Largest Cardinality 2-Interval Pattern Problem
Abstract The 2-Interval Pattern problem is to find the largest constrained pattern in a set of 2-intervals. The constrained pattern is a subset of the given 2-intervals such that ...
Hao Yuan, Linji Yang, Erdong Chen
ISSADS
2005
Springer
15 years 9 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...