Sciweavers

2717 search results - page 482 / 544
» Evaluation in Context
Sort
View
IMC
2009
ACM
14 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
14 years 4 months ago
A developmental model of neural computation using cartesian genetic programming
The brain has long been seen as a powerful analogy from which novel computational techniques could be devised. However, most artificial neural network approaches have ignored the...
Gul Muhammad Khan, Julian F. Miller, David M. Hall...
DATE
2003
IEEE
145views Hardware» more  DATE 2003»
14 years 3 months ago
Automated Bus Generation for Multiprocessor SoC Design
The performance of a system, especially a multiprocessor system, heavily depends upon the efficiency of its bus architecture. This paper presents a methodology to generate a custo...
Kyeong Keol Ryu, Vincent John Mooney
VR
2000
IEEE
101views Virtual Reality» more  VR 2000»
14 years 2 months ago
Multimodal Menu Presentation and Selection in Immersive Virtual Environments
Usability has become one of the key ingredients in making virtual reality (VR) systems work, and a big part of a usable VR system is in the design of effective interface/interacti...
Namgyu Kim, Gerard Jounghyun Kim, Chan-Mo Park, In...
DMIN
2006
146views Data Mining» more  DMIN 2006»
13 years 11 months ago
A Comparison of Two Document Clustering Approaches for Clustering Medical Documents
Medical data is often presented as free text in the form of medical reports. Such documents contain important information about patients, disease progression and management, but ar...
Fathi H. Saad, Beatriz de la Iglesia, Duncan G. Be...