Sciweavers

1275 search results - page 181 / 255
» Chunking with Decision Trees
Sort
View
JAIHC
2010
205views more  JAIHC 2010»
13 years 7 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
PR
2010
158views more  PR 2010»
13 years 7 months ago
Out-of-bag estimation of the optimal sample size in bagging
The performance of m-out-of-n bagging with and without replacement in terms of the sampling ratio (m/n) is analyzed. Standard bagging uses resampling with replacement to generate ...
Gonzalo Martínez-Muñoz, Alberto Su&a...
SAT
2010
Springer
127views Hardware» more  SAT 2010»
13 years 6 months ago
Symmetry and Satisfiability: An Update
Abstract. The past few years have seen significant progress in algorithms and heuristics for both SAT and symmetry detection. Additionally, the thesis that some of SAT's intra...
Hadi Katebi, Karem A. Sakallah, Igor L. Markov
EDM
2009
132views Data Mining» more  EDM 2009»
13 years 6 months ago
Predicting Students Drop Out: A Case Study
The monitoring and support of university freshmen is considered very important at many educational institutions. In this paper we describe the results of the educational data minin...
Gerben Dekker, Mykola Pechenizkiy, Jan Vleeshouwer...
ICDAR
2009
IEEE
13 years 6 months ago
Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles
A new method of logo detection in document images is proposed in this paper. It is based on the boundary extension of feature rectangles of which the definition is also given in t...
Hongye Wang, Youbin Chen