Sciweavers

2369 search results - page 434 / 474
» Active Learning with Confidence
Sort
View
CII
2008
100views more  CII 2008»
14 years 9 months ago
Knowledge formalization in experience feedback processes: An ontology-based approach
Because of the current trend of integration and interoperability of industrial systems, their size and complexity continue to grow making it more difficult to analyze, to understa...
Bernard Kamsu Foguem, Thierry Coudert, C. Bé...
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 9 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
150views Education» more  CORR 2010»
14 years 9 months ago
Extraction of Symbolic Rules from Artificial Neural Networks
Although backpropagation ANNs generally predict better than decision trees do for pattern classification problems, they are often regarded as black boxes, i.e., their predictions c...
S. M. Kamruzzaman, Md. Monirul Islam
EL
2008
184views more  EL 2008»
14 years 9 months ago
Breedbot: an evolutionary robotics application in digital content
Research paper Purpose of this paper This paper describe an integrated hardware/software system based on Evolutionary Robotics and its application in Edutainment context. Design/me...
Orazio Miglino, Onofrio Gigliotta, Michela Pontico...
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 9 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti