Sciweavers

358 search results - page 69 / 72
» Genetic Network Programming with rules
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 7 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
ICAIL
2005
ACM
14 years 1 months ago
A study of accrual of arguments, with applications to evidential reasoning
d on Dung’s [4] abstract argumentation system • arguments: trees of chained defeasible inferences • aim: determine the status of a query given a belief base • incorporation...
Henry Prakken
QNS
1996
13 years 8 months ago
Real Inferno
Inferno is an operating system well suited to applications that need to be portable, graphical, and networked. This paper describes the fundamental oating point facilities of the...
Eric Grosse
SOCO
2002
Springer
13 years 7 months ago
Granular neural web agents for stock prediction
A granular neural Web-based stock prediction agent is developed using the granular neural network (GNN) that can discover fuzzy rules. Stock data sets are downloaded from www.yahoo...
Yan-Qing Zhang, Somasheker Akkaladevi, George J. V...