Sciweavers

8016 search results - page 1574 / 1604
» On the practical genetic algorithms
Sort
View
DFN
2003
13 years 11 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
DICTA
2003
13 years 11 months ago
Algebraic Curve Fitting Support Vector Machines
An algebraic curve is defined as the zero set of a multivariate polynomial. We consider the problem of fitting an algebraic curve to a set of vectors given an additional set of v...
Christian J. Walder, Brian C. Lovell, Peter J. Koo...
KDID
2004
140views Database» more  KDID 2004»
13 years 11 months ago
Mining Formal Concepts with a Bounded Number of Exceptions from Transactional Data
We are designing new data mining techniques on boolean contexts to identify a priori interesting bi-sets (i.e., sets of objects or transactions associated to sets of attributes or ...
Jérémy Besson, Céline Robarde...
IAAI
2003
13 years 11 months ago
Guided Conversations about Leadership: Mentoring with Movies and Interactive Characters
Think Like a Commander – Excellence in Leadership (TLAC-XL) is an application designed for learning leadership skills both from the experiences of others and through a structure...
Randall W. Hill Jr., Jay Douglas, Andrew Gordon, F...
USENIX
2004
13 years 11 months ago
Time-based Fairness Improves Performance in Multi-Rate WLANs
The performance seen by individual clients on a wireless local area network (WLAN) is heavily influenced by the manner in which wireless channel capacity is allocated. The popular...
Godfrey Tan, John V. Guttag
« Prev « First page 1574 / 1604 Last » Next »