Sciweavers

2236 search results - page 410 / 448
» Intrusion detection techniques and approaches
Sort
View
AAAI
2000
13 years 9 months ago
Asynchronous Search with Aggregations
Many problem-solving tasks can be formalized as constraint satisfaction problems (CSPs). In a multi-agent setting, information about constraints and variables may belong to differ...
Marius-Calin Silaghi, Djamila Sam-Haroud, Boi Falt...
AAMAS
2007
Springer
13 years 8 months ago
Coordinating microscopic robots in viscous fluids
Multiagent control provides strategies for aggregating microscopic robots (“nanorobots”) in fluid environments relevant for medical applications. Unlike larger robots, viscou...
Tad Hogg
CORR
2010
Springer
214views Education» more  CORR 2010»
13 years 8 months ago
Hybrid Medical Image Classification Using Association Rule Mining with Decision Tree Algorithm
The main focus of image mining in the proposed method is concerned with the classification of brain tumor in the CT scan brain images. The major steps involved in the system are: p...
P. Rajendran, M. Madheswaran
JMM2
2008
107views more  JMM2 2008»
13 years 7 months ago
Finding Interesting Images in Albums using Attention
Commercial systems such as Flickr display interesting photos from their collection as an interaction mechanism for sampling the collection. It purely relies on social activity anal...
Karthikeyan Vaiapury, Mohan S. Kankanhalli
IAJIT
2007
150views more  IAJIT 2007»
13 years 7 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...