Sciweavers

7163 search results - page 1368 / 1433
» Privacy-Preserving Data Mining
Sort
View
ALIFE
2006
13 years 10 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho
ARTMED
2006
75views more  ARTMED 2006»
13 years 10 months ago
Semi-automatic learning of simple diagnostic scores utilizing complexity measures
Objective: Knowledge acquisition and maintenance in medical domains with a large application domain ontology is a difficult task. To reduce knowledge elicitation costs, semiautoma...
Martin Atzmüller, Joachim Baumeister, Frank P...
ASC
2006
13 years 10 months ago
Speeding up the learning of equivalence classes of bayesian network structures
For some time, learning Bayesian networks has been both feasible and useful in many problems domains. Recently research has been done on learning equivalence classes of Bayesian n...
Rónán Daly, Qiang Shen, J. Stuart Ai...
DATAMINE
2006
83views more  DATAMINE 2006»
13 years 10 months ago
Structural Hidden Markov Models Using a Relation of Equivalence: Application to Automotive Designs
Standard hidden Markov models (HMM's) have been studied extensively in the last two decades. It is well known that these models assume state conditional independence of the ob...
Djamel Bouchaffra, Jun Tan
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
« Prev « First page 1368 / 1433 Last » Next »