Sciweavers

1486 search results - page 28 / 298
» Firewall Rules Analysis
Sort
View
TMI
1998
97views more  TMI 1998»
14 years 11 months ago
Optimization and FROC Analysis of Rule-Based Detection Schemes Using a Multiobjective Approach
Abstract—Computerized detection schemes have the potential of increasing diagnostic accuracy in medical imaging by alerting radiologists to lesions that they initially overlooked...
Mark A. Anastasio, Matthew A. Kupinski, Robert M. ...
EUSFLAT
2009
171views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Time Series Analysis and Prediction Based on Fuzzy Rules and the Fuzzy Transform
Martin Stepnicka, Viktor Pavliska, Vilém No...
IPPS
2006
IEEE
15 years 5 months ago
Towards an analysis of race carrier conditions in real-time Java
The RTSJ memory model propose a mechanism based on a scope three containing all region-stacks in the system and a reference-counter collector. In order to avoid reference cycles a...
M. Teresa Higuera-Toledano
AMT
2006
Springer
108views Multimedia» more  AMT 2006»
15 years 3 months ago
Large Scale Analysis of Search Engine Content
We mine a large taxonomic dataset for subject classification rules. We then use these rules to perform an extensive analysis of the subject matter of the largest general purpose in...
John D. King
IAJIT
2006
92views more  IAJIT 2006»
14 years 11 months ago
A Rule-Based Extensible Stemmer for Information Retrieval with Application to Arabic
: This paper presents a new and extensible method for information retrieval and content analysis in natural languages (NL). The proposed method is stem-based; stems are extracted b...
Haidar Harmanani, Walid Keirouz, Saeed Raheel