139
click to vote
EMS
15 years 2 months ago
2008 IEEE
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
103
click to vote
EMS
15 years 7 months ago
2008 IEEE
Association rule mining (ARM) identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance and frequency of oc...
EMS
15 years 1 months ago
2008 IEEE 122
click to vote
EMS
15 years 7 months ago
2008 IEEE
This paper presents rough sets generating prediction rules scheme for stock price movement. The scheme was able to extract knowledge in the form of rules from daily stock movement...
101
click to vote
EMS
15 years 7 months ago
2008 IEEE
This paper presents investigations into the development of control schemes for end-point vibration suppression and input tracking of a flexible manipulator. A constrained planar s...
|