Sciweavers

16404 search results - page 3194 / 3281
» A set coverage problem
Sort
View
DMIN
2006
111views Data Mining» more  DMIN 2006»
15 years 4 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
FLAIRS
2004
15 years 4 months ago
Inducing Fuzzy Decision Trees in Non-Deterministic Domains using CHAID
Most decision tree induction methods used for extracting knowledge in classification problems are unable to deal with uncertainties embedded within the data, associated with human...
Jay Fowdar, Zuhair Bandar, Keeley A. Crockett
FLAIRS
2004
15 years 4 months ago
Case-Based Reasoning in Support of Intelligence Analysis
Open source intelligence analysts routinely use the web as a source of information related to their specific taskings. Effective information gathering on the web, despite the prog...
Elizabeth T. Whitaker, Robert L. Simpson Jr.
FOIS
2006
15 years 4 months ago
Qualities in Possible Worlds
The paper analyzes how and under which assumptions it is possible to compare (in a relationist setting and relatively to qualities) entities living in different worlds. We begin wi...
Stefano Borgo, Claudio Masolo
136
Voted
DC
2001
15 years 4 months ago
Metadata Interoperability and Meta-search on the Web
Several initiatives for establishing standards for metadata models are being carried out at the moment, but everyone focuses on their own requirements when defining metadata attri...
Enric Peig, Jaime Delgado, Ismael Pérez
« Prev « First page 3194 / 3281 Last » Next »