Sciweavers

1486 search results - page 88 / 298
» Firewall Rules Analysis
Sort
View
EVOW
2000
Springer
15 years 3 months ago
Combining Evolutionary, Connectionist, and Fuzzy Classification Algorithms for Shape Analysis
This paper presents an investigation into the classification of a difficult data set containing large intra-class variability but low inter-class variability. Standard classifiers...
Paul L. Rosin, Henry O. Nyongesa
CORR
2006
Springer
110views Education» more  CORR 2006»
14 years 12 months ago
An Analysis of Arithmetic Constraints on Integer Intervals
Arithmetic constraints on integer intervals are supported in many constraint programming systems. We study here a number of approaches to implement constraint propagation for thes...
Krzysztof R. Apt, Peter Zoeteweij
IEEECIT
2010
IEEE
14 years 10 months ago
Remainder Sign Analysis in Fixed-point Division
—This paper analyses remainder signs determinant issue in the computer fixed-point division operation. Together with the manual binary number division, the true code addition and...
Xuting Wan, Jianping Cai, Qifan Yang
SCL
2011
14 years 6 months ago
Analysis of consensus protocols with bounded measurement errors
This paper analyzes two classes of consensus algorithms in presence of bounded measurement errors. The considered protocols adopt an updating rule based either on constant or vani...
Andrea Garulli, Antonio Giannitrapani
PKDD
2007
Springer
120views Data Mining» more  PKDD 2007»
15 years 6 months ago
Privacy Preserving Market Basket Data Analysis
Randomized Response techniques have been empirically investigated in privacy preserving association rule mining. However, previous research on privacy preserving market basket data...
Ling Guo, Songtao Guo, Xintao Wu