Sciweavers

ACSW
2004
13 years 5 months ago
Applying Online Gradient Descent Search to Genetic Programming for Object Recognition
This paper describes an approach to the use of gradient descent search in genetic programming (GP) for object classification problems. In this approach, pixel statistics are used ...
William D. Smart, Mengjie Zhang
ACSW
2004
13 years 5 months ago
Monitoring and controlling of a multi - agent based workflow system
Business processes are often likely to undergo drastic changes and hence the workflow systems that model, simulate and enact these processes should support the monitoring and cont...
Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin...
ACSW
2004
13 years 5 months ago
Towards a multi-lingual workflow system a practical outlook
Due to rapid development in the global market, workflow systems are not limited to a single country. Electronic business like workflows span across countries and hence there arise...
Bastin Tony Roy Savarimuthu, Maryam Purvis
ACSW
2004
13 years 5 months ago
A wavelet-based neuro-fuzzy system for data mining small image sets
Creating a robust image classification system depends on having enough data with which one can adequately train and validate the model. If there is not enough available data, this...
Brendon J. Woodford, Da Deng, George L. Benwell
ACSW
2004
13 years 5 months ago
Developing and Delivering a Software Internationalisation Subject
This paper describes the content and delivery of a software internationalisation subject (ITN677) that was developed for Master of Information Technology (MIT) students in the Fac...
Tony Sahama, Chris Ho-Stuart, James M. Hogan
ACSW
2004
13 years 5 months ago
Survivability and Business Continuity Management
With the number of attacks on systems increasing, it is highly probable that sooner or later an intrusion will be successful. Not having to execute a complete shutdown in this sit...
Gerald Quirchmayr
ACSW
2004
13 years 5 months ago
A fuzzy ontology for medical document retrieval
Ontologies represent a method of formally expressing a shared understanding of information, and have been seen by many authors as a prerequisite for the "Semantic web". ...
David Parry
ACSW
2004
13 years 5 months ago
A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios
This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the ...
John Page, Arkady B. Zaslavsky, Maria Indrawan
ACSW
2004
13 years 5 months ago
Clustering Stream Data by Regression Analysis
In data clustering, many approaches have been proposed such as K-means method and hierarchical method. One of the problems is that the results depend heavily on initial values and...
Masahiro Motoyoshi, Takao Miura, Isamu Shioya
ACSW
2004
13 years 5 months ago
A Framework for Obfuscated Interpretation
Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead o...
Akito Monden, Antoine Monsifrot, Clark D. Thombors...