Sciweavers

1160 search results - page 148 / 232
» An Introduction to Collective Intelligence
Sort
View
CIA
2008
Springer
14 years 24 days ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
CIMCA
2005
IEEE
14 years 23 days ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
DIAGRAMS
2010
Springer
14 years 19 days ago
Diagram Editing on Interactive Displays Using Multi-touch and Pen Gestures
Creating and editing graphs and node-link diagrams by means of digital tools are crucial activities in domains such as software or business process modeling. However, these tools h...
Mathias Frisch, Jens Heydekorn, Raimund Dachselt
ECAI
2008
Springer
14 years 18 days ago
Automating Accreditation of Medical Web Content
123456 The increasing amount of freely available healthrelated web content generates, on one hand, excellent conditions for self-education of patients as well as physicians, but on...
Vangelis Karkaletsis, Pythagoras Karampiperis, Kon...
EVOW
2008
Springer
14 years 17 days ago
Improving Query Expansion with Stemming Terms: A New Genetic Algorithm Approach
Nowadays, searching information in the web or in any kind of document collection has become one of the most frequent activities. However, user queries can be formulated in a way th...
Lourdes Araujo, José R. Pérez-Ag&uum...