Sciweavers

1486 search results - page 191 / 298
» Firewall Rules Analysis
Sort
View
115
Voted
KES
2004
Springer
15 years 9 months ago
FESMI: A Fuzzy Expert System for Diagnosis and Treatment of Male Impotence
In this paper, we present the design, implementation and evaluation of FESMI, a fuzzy expert system that deals with diagnosis and treatment of male impotence. The diagnosis process...
Constantinos Koutsojannis, Ioannis Hatzilygeroudis
PCM
2004
Springer
180views Multimedia» more  PCM 2004»
15 years 9 months ago
An Adaptive Scene Compositor Model in MPEG-4 Player for Mobile Device
Abstract. MPEG-4 supports dynamic scene composition through various interactions such as adding/removing/replacing objects and changing object’s properties. MPEG-4 content can ex...
Hyunju Lee, Sangwook Kim
PKDD
2004
Springer
102views Data Mining» more  PKDD 2004»
15 years 9 months ago
Improving the Performance of the RISE Algorithm
Ideally, a multi-strategy learning algorithm performs better than its component approaches. RISE is a multi-strategy algorithm that combines rule induction and instance-based learn...
Aloísio Carlos de Pina, Gerson Zaverucha
COMPSAC
2003
IEEE
15 years 9 months ago
A Graph Grammar Approach to Software Architecture Verification and Transformation
Software architecture and design are usually modeled and represented by informal diagrams, such as architecture diagrams and UML diagrams. While these graphic notations are easy t...
Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song
128
Voted
DOCENG
2003
ACM
15 years 9 months ago
Management of trusted citations
We discuss how references and citations within a document to particular sources can be verified and guaranteed. When a document refers through a quotation to another document, th...
Christer Fernström