Sciweavers

432 search results - page 55 / 87
» Application of f-regression method to fuzzy classification p...
Sort
View
AP2PS
2009
IEEE
15 years 4 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
ASWC
2008
Springer
14 years 11 months ago
Deriving Concept Mappings through Instance Mappings
Ontology matching is a promising step towards the solution to the interoperability problem of the Semantic Web. Instance-based methods have the advantage of focusing on the most ac...
Balthasar A. C. Schopman, Shenghui Wang, Stefan Sc...
81
Voted
IJIS
2008
83views more  IJIS 2008»
14 years 9 months ago
An algorithm for modelling key terms
The ability to analyse and represent formally semantic relations of terms is a core issue in information retrieval (IR), natural language processing (NLP), and in many related are...
D. Cai, C. J. van Rijsbergen
TSMC
1998
169views more  TSMC 1998»
14 years 9 months ago
Real-time map building and navigation for autonomous robots in unknown environments
—An algorithmic solution method is presented for the problem of autonomous robot motion in completely unknown environments. Our approach is based on the alternate execution of tw...
Giuseppe Oriolo, Giovanni Ulivi, Marilena Venditte...
ICML
2001
IEEE
15 years 10 months ago
Feature selection for high-dimensional genomic microarray data
We report on the successful application of feature selection methods to a classification problem in molecular biology involving only 72 data points in a 7130 dimensional space. Ou...
Eric P. Xing, Michael I. Jordan, Richard M. Karp