Sciweavers

1220 search results - page 78 / 244
» Dependent classes
Sort
View
ESWA
2007
105views more  ESWA 2007»
13 years 9 months ago
Applying rough sets to prevent customer complaints for IC packaging foundry
Packaging is classified as one of back-end processes in the integrated circuits (ICs) manufacturing, highly capital-intensive and involves complex processes. Unlike the front-end...
Hsu-Hao Yang, Tzu-Chiang Liu, Yen-Ting Lin
ICPR
2010
IEEE
13 years 7 months ago
Boosting Bayesian MAP Classification
In this paper we redefine and generalize the classic k-nearest neighbors (k-NN) voting rule in a Bayesian maximum-a-posteriori (MAP) framework. Therefore, annotated examples are u...
Paolo Piro, Richard Nock, Frank Nielsen, Michel Ba...
INFOCOM
2009
IEEE
14 years 3 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
PAKDD
1999
ACM
113views Data Mining» more  PAKDD 1999»
14 years 1 months ago
Characterization of Default Knowledge in Ripple Down Rules Method
Abstract. \Ripple Down Rules (RDR)" Method is one of the promising approaches to directly acquire and encode knowledge from human experts. It requires data to be supplied incr...
Takuya Wada, Tadashi Horiuchi, Hiroshi Motoda, Tak...
SRDS
2006
IEEE
14 years 3 months ago
Solving Consensus Using Structural Failure Models
Failure models characterise the expected component failures in fault-tolerant computing. In the context of distributed systems, a failure model usually consists of two parts: a fu...
Timo Warns, Felix C. Freiling, Wilhelm Hasselbring