127
click to vote
EMS
15 years 2 months ago
2008 IEEE
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
EMS
15 years 7 months ago
2008 IEEE
Association rule mining (ARM) identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance and frequency of oc...
EMS
15 years 19 days ago
2008 IEEE 115
Voted
EMS
15 years 7 months ago
2008 IEEE
This paper presents rough sets generating prediction rules scheme for stock price movement. The scheme was able to extract knowledge in the form of rules from daily stock movement...
96
Voted
EMS
15 years 7 months ago
2008 IEEE
This paper presents investigations into the development of control schemes for end-point vibration suppression and input tracking of a flexible manipulator. A constrained planar s...
|