Sciweavers

1486 search results - page 200 / 298
» Firewall Rules Analysis
Sort
View
EACL
1989
ACL Anthology
15 years 1 months ago
The Syntactic Regularity Of English Noun Phrases
Approximately, 10,000 naturally occurring noun phrases taken from the LOB corpus were used firstly, to evaluate the NP component of the Alvey ANLT grammar (Grover et al., 1987, 19...
Lita Taylor, Claire Grover, Ted Briscoe
IJCAI
1989
15 years 1 months ago
An Empirical Comparison of Pattern Recognition, Neural Nets, and Machine Learning Classification Methods
Classification methods from statistical pattern recognition, neural nets, and machine learning were applied to four real-world data sets. Each of these data sets has been previous...
Sholom M. Weiss, Ioannis Kapouleas
CORR
2008
Springer
129views Education» more  CORR 2008»
14 years 12 months ago
Steganographic Routing in Multi Agent System Environment
: In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have ...
Krzysztof Szczypiorski, Igor Margasinski, Wojciech...
CORR
2008
Springer
76views Education» more  CORR 2008»
14 years 12 months ago
An Efficient Algorithm for a Sharp Approximation of Universally Quantified Inequalities
This paper introduces a new algorithm for solving a subclass of quantified constraint satisfaction problems (QCSP) where existential quantifiers precede universally quantified ine...
Alexandre Goldsztejn, Claude Michel, Michel Rueher
ENGL
2008
113views more  ENGL 2008»
14 years 12 months ago
Intelligent Decision Support for Evaluating and Selecting Information Systems Projects
This paper presents an intelligent decision support system (DSS) for facilitating the adoption of the most appropriate multicriteria analysis (MA) method in solving the information...
Hepu Deng, Santoso Wibowo