Sciweavers

1170 search results - page 116 / 234
» Experience with Ripple-Down Rules
Sort
View
DSS
2007
226views more  DSS 2007»
15 years 1 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
BC
2002
108views more  BC 2002»
15 years 1 months ago
Spike-timing-dependent plasticity: common themes and divergent vistas
Abstract. Recent experimental observations of spiketiming-dependent synaptic plasticity (STDP) have revitalized the study of synaptic learning rules. The most surprising aspect of ...
Ádám Kepecs, Mark C. W. van Rossum, ...
CVPR
2005
IEEE
16 years 3 months ago
Local Discriminant Embedding and Its Variants
We present a new approach, called local discriminant embedding (LDE), to manifold learning and pattern classification. In our framework, the neighbor and class relations of data a...
Hwann-Tzong Chen, Huang-Wei Chang, Tyng-Luh Liu
ICPR
2004
IEEE
16 years 3 months ago
Information Fusion in Face Identification
Information Fusion of multi-modal Biometrics has attracted much attention in recent years. However, this paper focuses on the information fusion in single modals, that is, the fac...
Bo Cao, Peng Yang, Shiguang Shan, Wen Gao, Wenchao...
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 2 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier