Sciweavers

1126 search results - page 206 / 226
» Modularity and the Rule of Adaptation
Sort
View
JMM2
2008
103views more  JMM2 2008»
13 years 8 months ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
ESWA
2007
178views more  ESWA 2007»
13 years 8 months ago
Educational data mining: A survey from 1995 to 2005
ct 7 Currently there is an increasing interest in data mining and educational systems, making educational data mining as a new growing 8 research community. This paper surveys the ...
Cristóbal Romero, Sebastián Ventura
FGCS
2007
125views more  FGCS 2007»
13 years 8 months ago
An autonomic tool for building self-organizing Grid-enabled applications
In this paper we present CAMELotGrid, a tool to manage Grid computations of Cellular Automata that support the efficient simulation of complex systems modeled by a very large numb...
Gianluigi Folino, Giandomenico Spezzano
TSMC
2008
172views more  TSMC 2008»
13 years 8 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
AMAI
2002
Springer
13 years 8 months ago
An Empirical Test of Patterns for Nonmonotonic Inference
: It is claimed that human inferential apparatus offers interesting ground in order to consider the intuitions of artificial intelligence researchers about the inference patterns a...
Rui Da Silva Neves, Jean-François Bonnefon,...