Sciweavers

1778 search results - page 119 / 356
» Building a Knowledge Base: An Example
Sort
View
80
Voted
IADIS
2003
15 years 2 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
86
Voted
ICML
2003
IEEE
16 years 1 months ago
Decision-tree Induction from Time-series Data Based on a Standard-example Split Test
This paper proposes a novel decision tree for a data set with time-series attributes. Our time-series tree has a value (i.e. a time sequence) of a time-series attribute in its int...
Yuu Yamada, Einoshin Suzuki, Hideto Yokoi, Katsuhi...
89
Voted
EUSFLAT
2001
127views Fuzzy Logic» more  EUSFLAT 2001»
15 years 2 months ago
Validation of the control quality of characteristic field based fuzzy controllers
Rule based systems for Fuzzy Control, Fuzzy Supervising and Fuzzy Diagnosis are non-linear multi-input, multi-output systems. The result of the signal processing within the system...
Rainer Hampel, Nasredin Chaker
92
Voted
NIPS
2003
15 years 2 months ago
One Microphone Blind Dereverberation Based on Quasi-periodicity of Speech Signals
Speech dereverberation is desirable with a view to achieving, for example, robust speech recognition in the real world. However, it is still a challenging problem, especially when...
Tomohiro Nakatani, Masato Miyoshi, Keisuke Kinoshi...
81
Voted
MVA
2007
108views Computer Vision» more  MVA 2007»
15 years 2 months ago
Furniture Model Creation Based on Direct Teaching to a Mobile Robot
— In this paper, a modeling method to handle furniture is proposed. In real environment, there is a lot of furniture such as drawer, cabinet and so on. If mobile robots can handl...
Kimitoshi Yamazaki, Takashi Tsubouchi, Masahiro To...