Sciweavers

502 search results - page 78 / 101
» Extraction of Logical Rules from Neural Networks
Sort
View
APCCM
2006
13 years 9 months ago
Network data mining: methods and techniques for discovering deep linkage between attributes
Network Data Mining identifies emergent networks between myriads of individual data items and utilises special algorithms that aid visualisation of `emergent' patterns and tre...
John Galloway, Simeon J. Simoff
AINA
2007
IEEE
14 years 2 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
AIRS
2010
Springer
13 years 6 months ago
Top-Down and Bottom-Up: A Combined Approach to Slot Filling
The Slot Filling task requires a system to automatically distill information from a large document collection and return answers for a query entity with specified attributes (`slot...
Zheng Chen, Suzanne Tamang, Adam Lee, Xiang Li, Ma...
IVC
2002
141views more  IVC 2002»
13 years 7 months ago
Real-time gesture recognition system and application
In this paper, we consider a vision-based system that can interpret a user's gestures in real time to manipulate windows and objects within a graphical user interface. A hand...
Chan Wah Ng, Surendra Ranganath
JIKM
2008
98views more  JIKM 2008»
13 years 8 months ago
Knowledge-Based Expert System Development and Validation with Petri Nets
Expert systems (ESs) are complex information systems that are expensive to build and difficult to validate. Numerous knowledge representation strategies such as rules, semantic net...
Madjid Tavana