Given the proliferation of technology sites and the growing diversity of their readership, readers are more and more likely to encounter specialized language and terminology that ...
Kathleen Tsoukalas, Bin Zhou 0002, Jian Pei, Davor...
In this paper we present a novel algorithm, named GBAP, that jointly uses automatic programming with ant colony optimization for mining classification rules. GBAP is based on a con...
This paper deals with the application of a well-known neural network technique, multi-layer back-propagation (BP) neural network, in financial data mining. A modified neural networ...
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
In this paper, we investigate and utilize the characteristic of the group movement of objects to achieve energy conservation in the inherently resource-constrained wireless object ...