Sciweavers

531 search results - page 70 / 107
» Methods for boosting recommender systems
Sort
View
ICSM
2003
IEEE
14 years 25 days ago
Source-Based Software Risk Assessment
The paper reports on a method for software risk assessments that takes into account “primary facts” and “secondary facts”. Primary facts are those obtained through automat...
Arie van Deursen, Tobias Kuipers
ENGL
2008
87views more  ENGL 2008»
13 years 7 months ago
A Well-Balanced Menu Planning with Fuzzy Weight
For lifestyle-related disease caused by recent change of eating habits in Japan, this paper proposes a menu planning method using rough set theory, and it can satisfy each individu...
Tomoko Kashima, Shimpei Matsumoto, Hiroaki Ishii
JAIHC
2010
205views more  JAIHC 2010»
13 years 6 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
IJCNN
2006
IEEE
14 years 1 months ago
How Not to Evaluate a Developmental System
—Computational models of development aim to describe the mechanisms that underlie the acquisition of new skills or the emergence of new capabilities. The strength of a model is j...
Frederick Shic, Brian Scassellati
RECOMB
2005
Springer
14 years 7 months ago
Predicting Protein-Peptide Binding Affinity by Learning Peptide-Peptide Distance Functions
Many important cellular response mechanisms are activated when a peptide binds to an appropriate receptor. In the immune system, the recognition of pathogen peptides begins when th...
Chen Yanover, Tomer Hertz