Sciweavers

1096 search results - page 121 / 220
» Evaluating Algorithms for Concept Description
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
JELIA
2004
Springer
14 years 2 months ago
Representation and Complexity in Boolean Games
Boolean games are a class of two-player games which may be defined via a Boolean form over a set of atomic actions. A particular game on some form is instantiated by partitioning ...
Paul E. Dunne, Wiebe van der Hoek
SBIA
2004
Springer
14 years 2 months ago
Towards to Similarity Identification to Help in the Agents' Negotiation
Abstract. Enterprise delegates Agents’ Negotiation is a simpler task if the enterprises involved in the transaction have homogeneous representation structures as well as the same...
Andreia Malucelli, Eugénio C. Oliveira
KDD
1995
ACM
135views Data Mining» more  KDD 1995»
14 years 9 days ago
Rough Sets Similarity-Based Learning from Databases
Manydata mining algorithms developed recently are based on inductive learning methods. Very few are based on similarity-based learning. However, similarity-based learning accrues ...
Xiaohua Hu, Nick Cercone
LPNMR
1995
Springer
14 years 9 days ago
Skeptical Rational Extensions
In this paper we propose a version of default logic with the following two properties: (1) defaults with mutually inconsistent justications are never used together in constructing ...
Artur Mikitiuk, Miroslaw Truszczynski