Sciweavers

2236 search results - page 360 / 448
» Intrusion detection techniques and approaches
Sort
View
SAC
2006
ACM
14 years 3 months ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...
CSB
2005
IEEE
143views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Multivariate gene selection: Does it help
When building predictors of disease state based on gene expression data, gene selection is performed in order to achieve a good performance and to identify a relevant subset of ge...
Carmen Lai, Marcel J. T. Reinders
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
14 years 2 months ago
Functional Coverage Driven Test Generation for Validation of Pipelined Processors
Functional verification of microprocessors is one of the most complex and expensive tasks in the current system-on-chip design process. A significant bottleneck in the validatio...
Prabhat Mishra, Nikil D. Dutt
MICAI
2005
Springer
14 years 2 months ago
Hybrid Particle Swarm - Evolutionary Algorithm for Search and Optimization
Particle Swarm Optimization (PSO) technique has proved its ability to deal with very complicated optimization and search problems. Several variants of the original algorithm have b...
Crina Grosan, Ajith Abraham, Sangyong Han, Alexand...
IUI
2004
ACM
14 years 2 months ago
Evaluation of visual balance for automated layout
Layout refers to the process of determining the size and position of the visual objects in an information presentation. We introduce the WeightMap, a bitmap representation of the ...
Simon Lok, Steven Feiner, Gary Ngai