Sciweavers

604 search results - page 87 / 121
» Regularization and feature selection for networked features
Sort
View
ADC
2006
Springer
135views Database» more  ADC 2006»
15 years 10 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...
IJCSA
2007
99views more  IJCSA 2007»
15 years 3 months ago
Wing Pattern-Based Classification of the Rhagoletis pomonella Species Complex Using Genetic Neural Networks
The Rhagoletis pomonella species complex consists of at least four sibling species. They are highly host specific as larvae, and display great fidelity as adults. The only certain...
Chengpeng Bi, Michael C. Saunders, Bruce A. McPher...
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 4 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
143
Voted
CASES
2009
ACM
15 years 10 months ago
CheckerCore: enhancing an FPGA soft core to capture worst-case execution times
Embedded processors have become increasingly complex, resulting in variable execution behavior and reduced timing predictability. On such processors, safe timing specifications e...
Jin Ouyang, Raghuveer Raghavendra, Sibin Mohan, Ta...
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
15 years 9 months ago
Constructive induction and genetic algorithms for learning concepts with complex interaction
Constructive Induction is the process of transforming the original representation of hard concepts with complex interaction into a representation that highlights regularities. Mos...
Leila Shila Shafti, Eduardo Pérez