Sciweavers

6693 search results - page 1330 / 1339
» Methods of Automatic Algorithm Generation
Sort
View
DMIN
2008
158views Data Mining» more  DMIN 2008»
13 years 11 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
OWLED
2008
13 years 11 months ago
Representing Product Designs Using a Description Graph Extension to OWL 2
Product development requires the ability to check design consistency, to verify design properties, and to answer questions about a design's possible implementations. These tas...
Henson Graves
CSREASAM
2006
13 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
NIPS
2004
13 years 11 months ago
Probabilistic Inference of Alternative Splicing Events in Microarray Data
Alternative splicing (AS) is an important and frequent step in mammalian gene expression that allows a single gene to specify multiple products, and is crucial for the regulation ...
Ofer Shai, Brendan J. Frey, Quaid Morris, Qun Pan,...
GECCO
2008
Springer
135views Optimization» more  GECCO 2008»
13 years 11 months ago
Context-dependent predictions and cognitive arm control with XCSF
While John Holland has always envisioned learning classifier systems (LCSs) as cognitive systems, most work on LCSs has focused on classification, datamining, and function appro...
Martin V. Butz, Oliver Herbort
« Prev « First page 1330 / 1339 Last » Next »