Sciweavers

43 search results - page 6 / 9
» On Representing and Generating Kernels by Fuzzy Equivalence ...
Sort
View
RSCTC
2000
Springer
197views Fuzzy Logic» more  RSCTC 2000»
14 years 4 days ago
Rough Set Approach to CBR
We discuss how Case Based Reasoning (CBR) (see e.g. [1], [4]) philosophy of adaptation of some known situations to new similar ones can be realized in rough set framework [5] for c...
Jan Wierzbicki
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
12 years 11 months ago
Oracle database filesystem
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
14 years 25 days ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
AAAI
2000
13 years 10 months ago
Restricted Bayes Optimal Classifiers
We introduce the notion of restricted Bayes optimal classifiers. These classifiers attempt to combine the flexibility of the generative approach to classification with the high ac...
Simon Tong, Daphne Koller
CORR
2006
Springer
108views Education» more  CORR 2006»
13 years 8 months ago
Two polygraphic presentations of Petri nets
: This document gives an algebraic and two polygraphic translations of Petri nets, all three providing an easier way to describe reductions and to identify some of them. The first ...
Yves Guiraud