Sciweavers

7380 search results - page 1323 / 1476
» time 2008
Sort
View
ISCI
2008
166views more  ISCI 2008»
15 years 4 months ago
Incremental and interactive mining of web traversal patterns
Web mining involves the application of data mining techniques to large amounts of web-related data in order to improve web services. Web traversal pattern mining involves discover...
Yue-Shi Lee, Show-Jane Yen
ISCI
2008
130views more  ISCI 2008»
15 years 4 months ago
Unified eigen analysis on multivariate Gaussian based estimation of distribution algorithms
Multivariate Gaussian models are widely adopted in continuous Estimation of Distribution Algorithms (EDAs), and covariance matrix plays the essential role in guiding the evolution...
Weishan Dong, Xin Yao
ISF
2008
114views more  ISF 2008»
15 years 4 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
IVC
2008
101views more  IVC 2008»
15 years 4 months ago
A system for processing handwritten bank checks automatically
In the US and many other countries, bank checks are preprinted with the account number and the check number in MICR ink and format; as such, these two numeric fields can be easily...
Rafael Palacios, Amar Gupta
IVC
2008
147views more  IVC 2008»
15 years 4 months ago
Distinctive and compact features
We consider the problem of extracting features for multi-class recognition problems. The features are required to make fine distinction between similar classes, combined with tole...
Ayelet Akselrod-Ballin, Shimon Ullman
« Prev « First page 1323 / 1476 Last » Next »