#### Filter Results:

#### Publication Year

1992

2015

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

In this paper, we reevaluate the use of adaptive compressed caching in order to improve system performance through reduction of accesses to the backing stores. We propose a new and simple adaptability policy that adjusts the compressed cache size on-the-fly, and evaluate a compressed caching system with this policy through an implementation in a widely used… (More)

We apply Artificial Immune Systems(AIS) [4] for credit card fraud detection and we compare it to other methods such as Neural Nets(NN) [8] and Bayesian Nets(BN) [2], Naive Bayes(NB) and Decision Trees(DT) [13]. Exhaustive search and Genetic Algorithm(GA) [7] are used to select optimized parameters sets, which minimizes the fraud cost for a credit card… (More)

Alignments of sequences are widely used for biological sequence comparisons. Only biological events like mutations, insertions and deletions are usually modeled and other biological events like inversions are not automatically detected by the usual alignment algorithms. Alignment with inversions does not have a known polynomial algorithm and a… (More)

Similarity search in texts, notably in biological sequences, has received substantial attention in the last few years. Numerous filtration and indexing techniques have been created in order to speed up the solution of the problem. However, previous filters were made for speeding up pattern matching, or for finding repetitions between two strings or… (More)

BACKGROUND
Identifying local similarity between two or more sequences, or identifying repeats occurring at least twice in a sequence, is an essential part in the analysis of biological sequences and of their phylogenetic relationship. Finding such fragments while allowing for a certain number of insertions, deletions, and substitutions, is however known to… (More)

Reputation systems are specially important in e-markets, where they help buyers to decide whether or not to purchase a product. This work addresses the task of finding attempts to deceive reputation systems in e-markets. Our goal is to generate a list of users (sellers) ranked by the probability of fraud. First we describe characteristics related to… (More)

Optical fibers were used to induce fluorescence by means of two-photon absorption in fluorophores. The effect, studied in a solution of 4',6-diamidino-2-phenylindole, demonstrated that a single-mode fiber is a more efficient two-photon excitation source than a multimode fiber. This was shown with three different fibers.

In this paper we prove that the congruence classes of A associated to the Burnside semigroup with jAj generators deened by the equation x n = x n+m , for n 4 and m 1, are recognizable. This problem was originally formulated by Brzozowski in 1969 for m = 1 and n 2. De Luca and Varricchio solved the problem for n 5 in 90. A little later, McCammond extended… (More)