Sciweavers

20294 search results - page 203 / 4059
» Algorithmic Information Theory
Sort
View
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 5 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
IEEEIAS
2009
IEEE
15 years 11 months ago
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression
: Threats to information security for healthcare information system increased tremendously. There are various factors that contribute to information security threats, many research...
Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilw...
147
Voted
MM
2003
ACM
143views Multimedia» more  MM 2003»
15 years 10 months ago
Approximate matching algorithms for music information retrieval using vocal input
Effective use of multimedia collections requires efficient and intuitive methods of searching and browsing. This work considers databases which store music and explores how these...
Richard L. Kline, Ephraim P. Glinert
PDP
2010
IEEE
15 years 10 months ago
Load Balancing Algorithms with Partial Information Management for the DLML Library
Abstract—Load balancing algorithms are an essential component of parallel computing reducing the response time of applications. Frequently, balancing algorithms have a centralize...
Juan Santana-Santana, Miguel A. Castro-Garcí...
129
Voted
DSS
2006
91views more  DSS 2006»
15 years 5 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...