Sciweavers

327 search results - page 47 / 66
» Automatic Array Privatization
Sort
View
DMIN
2006
106views Data Mining» more  DMIN 2006»
13 years 11 months ago
A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile
This paper describes an effective medical claim fraud/abuse detection system based on data mining used by a Chilean private health insurance company. Fraud and abuse in medical cla...
Pedro A. Ortega, Cristián J. Figueroa, Gonz...
EUROPAR
2007
Springer
14 years 3 months ago
Program Behavior Characterization Through Advanced Kernel Recognition
Abstract. Understanding program behavior is at the foundation of program optimization. Techniques for automatic recognition of program constructs (from now on, computational kernel...
Manuel Arenaz, Juan Touriño, Ramon Doallo
CODES
2005
IEEE
14 years 3 months ago
An architectural level design methodology for embedded face detection
Face detection and recognition research has attracted great attention in recent years. Automatic face detection has great potential in a large array of application areas, includin...
Vida Kianzad, Sankalita Saha, Jason Schlessman, Ga...
WCRE
2005
IEEE
14 years 3 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
EH
2002
IEEE
266views Hardware» more  EH 2002»
14 years 2 months ago
Towards Evolvable Analog Fuzzy Logic Controllers
Fuzzy Logic has proved to be a very powerful technique in the discipline of system control. A Fuzzy Logic Controller is defined by a collection of fuzzy if-then rules and a set of...
José Franco Machado do Amaral, Jorge Lu&iac...