Sciweavers

563 search results - page 95 / 113
» constraints 2002
Sort
View
ISCI
2002
132views more  ISCI 2002»
13 years 7 months ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...
IWC
2002
121views more  IWC 2002»
13 years 7 months ago
Discovering user communities on the Internet using unsupervised machine learning techniques
Interest in the analysis of user behaviour on the Internet has been increasing rapidly, especially since the advent of electronic commerce. In this context, we argue here for the ...
Georgios Paliouras, Christos Papatheodorou, Vangel...
JCS
2002
115views more  JCS 2002»
13 years 7 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
JMLR
2002
106views more  JMLR 2002»
13 years 7 months ago
Some Greedy Learning Algorithms for Sparse Regression and Classification with Mercer Kernels
We present some greedy learning algorithms for building sparse nonlinear regression and classification models from observational data using Mercer kernels. Our objective is to dev...
Prasanth B. Nair, Arindam Choudhury 0002, Andy J. ...
JSS
2002
90views more  JSS 2002»
13 years 7 months ago
Producing reliable software: an experiment
A customer of high assurance software recently sponsored a software engineering experiment in which a small real-time software system was developed concurrently by two popular sof...
Carol Smidts, Xin Huang, James C. Widmaier