Sciweavers

621 search results - page 123 / 125
» chi 2008
Sort
View
USS
2008
14 years 1 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
ACMICEC
2008
ACM
240views ECommerce» more  ACMICEC 2008»
14 years 20 days ago
Document-oriented heterogeneous business process integration through collaborative e-marketplace
In this paper, we studied the semantic consistency maintenance issue between heterogeneous contexts, that is, how a firm business process of one e-marketplace can be transformed t...
Jingzhi Guo, Zhuo Hu, Chi-Kit Chan, Yufeng Luo, Ch...
ECAI
2008
Springer
14 years 19 days ago
MTForest: Ensemble Decision Trees based on Multi-Task Learning
Many ensemble methods, such as Bagging, Boosting, Random Forest, etc, have been proposed and widely used in real world applications. Some of them are better than others on noisefre...
Qing Wang, Liang Zhang, Mingmin Chi, Jiankui Guo
GECCO
2008
Springer
175views Optimization» more  GECCO 2008»
13 years 12 months ago
Using differential evolution for symbolic regression and numerical constant creation
One problem that has plagued Genetic Programming (GP) and its derivatives is numerical constant creation. Given a mathematical formula expressed as a tree structure, the leaf node...
Brian M. Cerny, Peter C. Nelson, Chi Zhou
WWW
2008
ACM
14 years 11 months ago
Facetnet: a framework for analyzing communities and their evolutions in dynamic networks
We discover communities from social network data, and analyze the community evolution. These communities are inherent characteristics of human interaction in online social network...
Yu-Ru Lin, Yun Chi, Shenghuo Zhu, Hari Sundaram, B...