Sciweavers

1160 search results - page 148 / 232
» An Introduction to Collective Intelligence
Sort
View
CIA
2008
Springer
15 years 2 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
111
Voted
CIMCA
2005
IEEE
15 years 2 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
122
Voted
DIAGRAMS
2010
Springer
15 years 2 months ago
Diagram Editing on Interactive Displays Using Multi-touch and Pen Gestures
Creating and editing graphs and node-link diagrams by means of digital tools are crucial activities in domains such as software or business process modeling. However, these tools h...
Mathias Frisch, Jens Heydekorn, Raimund Dachselt
97
Voted
ECAI
2008
Springer
15 years 2 months ago
Automating Accreditation of Medical Web Content
123456 The increasing amount of freely available healthrelated web content generates, on one hand, excellent conditions for self-education of patients as well as physicians, but on...
Vangelis Karkaletsis, Pythagoras Karampiperis, Kon...
EVOW
2008
Springer
15 years 2 months ago
Improving Query Expansion with Stemming Terms: A New Genetic Algorithm Approach
Nowadays, searching information in the web or in any kind of document collection has become one of the most frequent activities. However, user queries can be formulated in a way th...
Lourdes Araujo, José R. Pérez-Ag&uum...