Sciweavers

1389 search results - page 242 / 278
» Active learning using pre-clustering
Sort
View
SCANGIS
2003
13 years 11 months ago
Mobile E-Commerce and Location-Based Services: Technology and Requirements
Advances in Internet and network technology and the rapidly growing number of mobile personal devices result in the fast growth of Mobile E-Commerce, M-Commerce. In this paper we v...
Aphrodite Tsalgatidou, Jari Veijalainen, Jouni Mar...
BIS
2010
246views Business» more  BIS 2010»
13 years 11 months ago
On the Cognitive Effectiveness of Routing Symbols in Process Modeling Languages
Abstract. Process models provide visual support for analyzing and improving complex organizational processes. In this paper, we discuss differences of process modeling languages us...
Kathrin Figl, Jan Mendling, Mark Strembeck, Jan Re...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 10 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 9 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
AICOM
2002
103views more  AICOM 2002»
13 years 9 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen