Sciweavers

918 search results - page 150 / 184
» On n-contractive fuzzy logics
Sort
View
ISSA
2004
13 years 9 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
FSKD
2010
Springer
270views Fuzzy Logic» more  FSKD 2010»
13 years 8 months ago
Ontology-based knowledge discovery and sharing in bioinformatics and medical informatics: A brief survey
Abstract--Worldwide health scientists are producing, accessing, analyzing, integrating, and storing massive amounts of digital medical data daily, through observation, experimentat...
Jingshan Huang, Dejing Dou, Lei He, Pat Hayes, Jia...
FSKD
2008
Springer
174views Fuzzy Logic» more  FSKD 2008»
13 years 8 months ago
A Hybrid Re-sampling Method for SVM Learning from Imbalanced Data Sets
Support Vector Machine (SVM) has been widely studied and shown success in many application fields. However, the performance of SVM drops significantly when it is applied to the pr...
Peng Li, Pei-Li Qiao, Yuan-Chao Liu
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 8 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
FSKD
2008
Springer
123views Fuzzy Logic» more  FSKD 2008»
13 years 8 months ago
PartSpan: Parallel Sequence Mining of Trajectory Patterns
The trajectory pattern mining problem has recently attracted increasing attention. This paper precisely addresses the parallel mining problem of trajectory patterns as well as the...
Shaojie Qiao, Changjie Tang, Shucheng Dai, Mingfan...