Sciweavers

COMSIS
2006
71views more  COMSIS 2006»
13 years 11 months ago
Data Mining Techniques Based on Grey System Theories for Time Sequence Data
Liu Bin, Zhang Hui, Sifeng Liu, Yaoguo Dang
COMSIS
2006
156views more  COMSIS 2006»
13 years 11 months ago
A Comparison of the Bagging and the Boosting Methods Using the Decision Trees Classifiers
In this paper we present an improvement of the precision of classification algorithm results. Two various approaches are known: bagging and boosting. This paper describes a set of ...
Kristína Machova, Miroslav Puszta, Frantise...
COMSIS
2006
100views more  COMSIS 2006»
13 years 11 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
COMSIS
2006
141views more  COMSIS 2006»
13 years 11 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
COMSIS
2006
99views more  COMSIS 2006»
13 years 11 months ago
A Structure Editor for the Program Composing Assistant
The Program Composing Assistant is an interactive generic development environment dedicated to programming languages. It provides a structure editor with graphical user interface a...
Zorica Suvajdzin, Miroslav Hajdukovic
COMSIS
2006
129views more  COMSIS 2006»
13 years 11 months ago
Constraint-Based Knowledge Representation for Individualized Instruction
Traditional knowledge representations were developed to encode complete, explicit and executable programs, a goal that makes them less than ideal for representing the incomplete an...
Stellan Ohlsson, Antonija Mitrovic
COMSIS
2006
79views more  COMSIS 2006»
13 years 11 months ago
Simulation Analysis of Protected B2B e-Commerce Processes
Zoran V. Zivkovic, Milorad J. Stanojevic