Sciweavers

1486 search results - page 110 / 298
» Firewall Rules Analysis
Sort
View
EUROGP
2004
Springer
133views Optimization» more  EUROGP 2004»
15 years 9 months ago
Lymphoma Cancer Classification Using Genetic Programming with SNR Features
Lymphoma cancer classification with DNA microarray data is one of important problems in bioinformatics. Many machine learning techniques have been applied to the problem and produc...
Jin-Hyuk Hong, Sung-Bae Cho
VL
1992
IEEE
163views Visual Languages» more  VL 1992»
15 years 8 months ago
The Conversion of Diagrams to Knowledge Bases
If future electronic documents are to be truly useful, we must devise ways to automatically turn them into knowledgebases. In particular, we must be able to do this for diagrams. ...
Robert P. Futrelle
ICDE
1991
IEEE
175views Database» more  ICDE 1991»
15 years 7 months ago
Constraint-Based Reasoning in Deductive Databases
— Constraints play an important role in the efficient query evaluation in deductive databases. In this paper, constraint-based query evaluation in deductive databases is investi...
Jiawei Han
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 5 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
EACL
1993
ACL Anthology
15 years 5 months ago
Two-level Description of Turkish Morphology
: This paper describes a full two-level morphological description 5,9 of Turkish word structures. The description has been implemented using the PC-KIMMO environment 2 and is based...
Kemal Oflazer