• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 110
Next 10 →

Collection Tree Protocol

by unknown authors
"... This paper presents and evaluates two principles for designing robust, reliable, and efficient collection protocols. These principles allow a protocol to benefit from accurate and agile link estimators by handling the dynamism such estimators introduce to routing tables. The first is datapath valida ..."
Abstract - Add to MetaCart
latency. We study these mechanisms in an implementation called Collection Tree Protocol (CTP) and evaluate their contributions to its performance. We evaluate CTP on 12 different testbeds ranging in size from 20–310 nodes and comprising 7 hardware platforms, on 6 different link layers, and on interference

A dynamic adaptation of AD-trees for efficient machine learning on large data sets

by Paul Komarek, Andrew Moore - In Proceedings of the 17th International Conference on Machine Learning , 2000
"... This paper has no novel learning or statistics: it is concerned with making a wide class of preexisting statistics and learning algorithms computationally tractable when faced with data sets with massive numbers of records or attributes. It briefly reviews the static AD-tree structure of Moore and L ..."
Abstract - Cited by 21 (5 self) - Add to MetaCart
in cases where new data is frequently being appended to the data set. We provide a careful explanation of the data structure, and then empirically evaluate the performance under varying access patterns induced by different learning algorithms such as association rules, decision trees and Bayes net

7 Classification and Regression Trees, Bagging, and Boosting

by unknown authors
"... 15 ..."
Abstract - Add to MetaCart
Abstract not found

doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine

by Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis , 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract - Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real

The central question in entrepreneurial cognition research 2007. Entrepreneurship Theory and Practice,

by Ronald K Mitchell , Lowell W Busenitz , Barbara Bird Connie , Marie Gaglio , Jeffery S Mcmullen , Eric A Morse , J Brock Smith , 2007
"... In this article, we take note of advances in the entrepreneurial cognition research stream. In doing so, we bring increasing attention to the usefulness of entrepreneurial cognition research. First, we offer and develop a central research question to further enable entrepreneurial cognition inquiry ..."
Abstract - Cited by 42 (4 self) - Add to MetaCart
aspects of a simple four-word query: "How do entrepreneurs think?" Whether or not researchers are probing individual differences and why some people make better entrepreneurs than others, studying how 2 ENTREPRENEURSHIP THEORY and PRACTICE entrepreneurs develop unique knowledge structures

1A WEIGHTED-TREE SIMILARITY ALGORITHM FOR MULTI-AGENT SYSTEMS IN E-BUSINESS ENVIRONMENTS*

by Virendrakumar C. Bhavsar, Harold Boley, Lu Yang
"... A tree similarity algorithm for match-making of agents in e-Business environments is presented. Product/service descriptions of seller and buyer agents are represented as node-labelled, arc-labelled, arc-weighted trees. A similarity algorithm for such trees is developed as the basis for semantic mat ..."
Abstract - Add to MetaCart
A tree similarity algorithm for match-making of agents in e-Business environments is presented. Product/service descriptions of seller and buyer agents are represented as node-labelled, arc-labelled, arc-weighted trees. A similarity algorithm for such trees is developed as the basis for semantic

Object/relational query optimization with chase

by Lucian Popa
"... and backchase ..."
Abstract - Add to MetaCart
and backchase

Query Evaluation with Constant Delay

by Thèse De Doctorat, Normale Supérieure, De Cachan, Présentée Par, Monsieur Wojciech Kazana, Docteur De, Supérieure De Cachan, Nicole Bidoit, Professeur Président, Arnaud Durand, Patrice Ossona, Mendez Chargé, Victor Vianu, Professeur Examinateur, Luc Segoufin, Directeur Recherche Directeur
"... I am grateful to Luc Segoufin who kindly accepted me to be his PhD student. He introduced me to the problem of query enumeration and encouraged me to look for the answers to all the questions that emerged during our collaboration. He was a truly great advisor, always supportive and available for dis ..."
Abstract - Add to MetaCart
I am grateful to Luc Segoufin who kindly accepted me to be his PhD student. He introduced me to the problem of query enumeration and encouraged me to look for the answers to all the questions that emerged during our collaboration. He was a truly great advisor, always supportive and available

New Techniques for Geographic Routing

by Ben Wing, Ben Wing, Lup Leong, Lup Leong , 2006
"... As wireless sensor networks continue to grow in size, we are faced with the prospect of emerging wireless networks with hundreds or thousands of nodes. Geographic routing algorithms are a promising alternative to tradition ad hoc routing algorithms in this new domain for point-to-point routing, but ..."
Abstract - Add to MetaCart
As wireless sensor networks continue to grow in size, we are faced with the prospect of emerging wireless networks with hundreds or thousands of nodes. Geographic routing algorithms are a promising alternative to tradition ad hoc routing algorithms in this new domain for point-to-point routing, but deployments of such algorithms are currently uncommon because of some practical difficulties.

Annual variability in seed production by woody plants and the masting concept: Reassessment of principles and relationship to pollination and seed dispersal. The American Naturalist 152

by Carlos M Herrera,' , Pedro Jordano,' , Javier G~i T I A N ,~, $ , Anna Traveset3$ , 1998
"... ABSTRACT: By analyzing 296 published and unpublished data sets describing annual variation in seed output by 144 species of woody plants, this article addresses the following questions. Do plant species naturally fall into distinct groups corresponding to masting and nonmasting habits? Do plant pop ..."
Abstract - Cited by 28 (0 self) - Add to MetaCart
," and have dealt with species putatively exhibiting this seeding pattern (see Questions and Predictions By analyzing a large sample of published and unpublished data on annual seed production by a taxonomically and ecologically diverse array of polycarpic woody plants, we will specifically address
Next 10 →
Results 1 - 10 of 110
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University