Sciweavers

7163 search results - page 1371 / 1433
» Privacy-Preserving Data Mining
Sort
View
SOCO
2008
Springer
13 years 10 months ago
Tabu search for attribute reduction in rough set theory
Attribute reduction of an information system is a key problem in rough set theory and its applications. Using computational intelligence (CI) tools to solve such problems has rece...
Abdel-Rahman Hedar, Jue Wang, Masao Fukushima
TKDE
2008
114views more  TKDE 2008»
13 years 9 months ago
Neural-Based Learning Classifier Systems
UCS is a supervised learning classifier system that was introduced in 2003 for classification in data mining tasks. The representation of a rule in UCS as a univariate classificati...
Hai Huong Dam, Hussein A. Abbass, Chris Lokan, Xin...
TMM
2008
201views more  TMM 2008»
13 years 9 months ago
Fast Best-Match Shape Searching in Rotation-Invariant Metric Spaces
Object recognition and content-based image retrieval systems rely heavily on the accurate and efficient identification of shapes. A fundamental requirement in the shape analysis p...
Dragomir Yankov, Eamonn J. Keogh, Li Wei, Xiaopeng...
TSE
2008
91views more  TSE 2008»
13 years 9 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
CN
2004
111views more  CN 2004»
13 years 9 months ago
Edge-to-edge measurement-based distributed network monitoring
Continuous monitoring of a network domain poses several challenges. First, routers of a network domain need to be polled periodically to collect statistics about delay, loss, and ...
Ahsan Habib, Maleq Khan, Bharat K. Bhargava
« Prev « First page 1371 / 1433 Last » Next »