Sciweavers

4166 search results - page 481 / 834
» Automating the constraining process
Sort
View
125
Voted
ICDM
2003
IEEE
184views Data Mining» more  ICDM 2003»
15 years 10 months ago
Detecting Patterns of Change Using Enhanced Parallel Coordinates Visualization
Analyzing data to find trends, correlations, and stable patterns is an important problem for many industrial applications. In this paper, we propose a new technique based on paral...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
156
Voted
ICCBR
2001
Springer
15 years 9 months ago
A Fuzzy-Rough Approach for Case Base Maintenance
Abstract. This paper proposes a fuzzy-rough method of maintaining CaseBased Reasoning (CBR) systems. The methodology is mainly based on the idea that a large case library can be tr...
Guoqing Cao, Simon C. K. Shiu, Xizhao Wang
146
Voted
ACSAC
2000
IEEE
15 years 9 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
CSMR
2000
IEEE
15 years 9 months ago
Experiences Reverse Engineering Manually
Better understanding manual reverse engineering can make it and any associated systems reengineering more effective. We reverse engineered a version of a system (referred to as &q...
Dave Swafford, Diana Elman, Peter Aiken, Jeff Merh...
LICS
2000
IEEE
15 years 9 months ago
Virtual Symmetry Reduction
We provide a general method for ameliorating state explosion via symmetry reduction in certain asymmetric systems, such as systems with many similar, but not identical, processes....
E. Allen Emerson, John Havlicek, Richard J. Trefle...