Sciweavers

1750 search results - page 169 / 350
» Abduction in Classification Tasks
Sort
View
CIS
2005
Springer
15 years 4 months ago
Computational Intelligence for Network Intrusion Detection: Recent Contributions
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
Asim Karim
ITS
2004
Springer
137views Multimedia» more  ITS 2004»
15 years 3 months ago
Integrating Intelligent Agents, User Models, and Automatic Content Categorization in a Virtual Environment
This work is devoted to lattice-based information representation of correlations among delivery criteria in transport logistics. The number of delivery criteria, their ranking acc...
Cássia Trojahn dos Santos, Fernando Santos ...
KDD
1994
ACM
140views Data Mining» more  KDD 1994»
15 years 2 months ago
A Comparison of Pruning Methods for Relational Concept Learning
Pre-Pruning and Post-Pruning are two standard methods of dealing with noise in concept learning. Pre-Pruning methods are very efficient, while Post-Pruning methods typically are m...
Johannes Fürnkranz
82
Voted
AI
2006
Springer
15 years 2 months ago
Language Patterns in the Learning of Strategies from Negotiation Texts
The paper shows how to construct language patterns that signal influence strategies and tactical moves corresponding to such strategies. We apply corpus analysis methods to the ext...
Marina Sokolova, Stan Szpakowicz
CSCW
2008
ACM
15 years 9 days ago
Hunting for fun: solitude and attentiveness in collaboration
The design of online collaborative computer games and pervasive games can learn from the everyday practice of deer hunting. We present an ethnographic study revealing how hunters ...
Oskar Juhlin, Alexandra Weilenmann