Sciweavers

2715 search results - page 242 / 543
» Network bucket testing
Sort
View
ECAL
1995
Springer
14 years 2 months ago
Evolving Artificial Neural Networks that Develop in Time
Although recently there has been an increasing interest in studing genetically-based development using Artificial Life models, the mapping of the genetic information into the phen...
Stefano Nolfi, Domenico Parisi
INCDM
2010
Springer
152views Data Mining» more  INCDM 2010»
14 years 2 months ago
Spam Email Filtering Using Network-Level Properties
Abstract. Spam is serious problem that affects email users (e.g. phishing attacks, viruses and time spent reading unwanted messages). We propose a novel spam email filtering appr...
Paulo Cortez, André Correia, Pedro Sousa, M...
WSC
2004
14 years 5 days ago
Enabling a Transforming Army at War: Analysis to Improve Logistics Network Efficiency and Effectiveness
This paper introduces and summarizes a comprehensive systems approach guiding an ongoing project addressing these significant challenges confronting logistics transformation. Curr...
Greg H. Parlier
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 11 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
IJAR
2010
75views more  IJAR 2010»
13 years 9 months ago
Generalized loopy 2U: A new algorithm for approximate inference in credal networks
Credal nets generalize Bayesian nets by relaxing the requirement of precision of probabilities. Credal nets are considerably more expressive than Bayesian nets, but this makes bel...
Alessandro Antonucci, Yi Sun, Cassio P. de Campos,...