Sciweavers

452 search results - page 52 / 91
» Is home network application acceptable or not
Sort
View
ECUMN
2007
Springer
14 years 2 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
ICANN
2001
Springer
14 years 1 months ago
Fast Training of Support Vector Machines by Extracting Boundary Data
Support vector machines have gotten wide acceptance for their high generalization ability for real world applications. But the major drawback is slow training for classification p...
Shigeo Abe, Takuya Inoue
ICTAI
1999
IEEE
14 years 1 months ago
Neural Data Mining for Credit Card Fraud Detection
The prevention of credit card fraud is an important application for prediction techniques. One major obstacle for using neural network training techniques is the high necessary di...
R. Brause, T. Langsdorf, Michael Hepp
NCA
2008
IEEE
13 years 8 months ago
Neurodynamic programming: a case study of the traveling salesman problem
The paper focuses on the study of solving the large-scale traveling salesman problem (TSP) based on neurodynamic programming. From this perspective, two methods, temporal differenc...
Jia Ma, Tao Yang, Zeng-Guang Hou, Min Tan, Derong ...
BMCBI
2007
129views more  BMCBI 2007»
13 years 8 months ago
Integrated network reconstruction, visualization and analysis using YANAsquare
Background: Modeling of metabolic networks includes tasks such as network assembly, network overview, calculation of metabolic fluxes and testing the robustness of the network. Re...
Roland Schwarz, Chunguang Liang, Christoph Kaleta,...