Sciweavers

4660 search results - page 795 / 932
» Learning from imperfect data
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 9 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
CONSTRAINTS
2008
182views more  CONSTRAINTS 2008»
13 years 9 months ago
Constraint Programming in Structural Bioinformatics
Bioinformatics aims at applying computer science methods to the wealth of data collected in a variety of experiments in life sciences (e.g. cell and molecular biology, biochemistry...
Pedro Barahona, Ludwig Krippahl
ALGORITHMICA
2006
74views more  ALGORITHMICA 2006»
13 years 9 months ago
Parallelizing Feature Selection
Classification is a key problem in machine learning/data mining. Algorithms for classification have the ability to predict the class of a new instance after having been trained on...
Jerffeson Teixeira de Souza, Stan Matwin, Nathalie...
ENVSOFT
2006
144views more  ENVSOFT 2006»
13 years 9 months ago
Ten iterative steps in development and evaluation of environmental models
Models are increasingly being relied upon to inform and support natural resource management. They are incorporating an ever broader range of disciplines and now often confront peo...
Anthony J. Jakeman, Rebecca A. Letcher, John P. No...
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 9 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal