Sciweavers

1188 search results - page 76 / 238
» Generating Connectives
Sort
View
105
Voted
FLAIRS
2001
15 years 4 months ago
Graphical Analysis of Value of Information in Decision Models
Wereviewand extendthe qualitative relationships about the informational relevanceof variables in graphical decision modelsbased on conditional independenciesrevealedthroughgraphic...
Songsong Xu, Kim-Leng Poh, Eric Horvitz
173
Voted
ESANN
1997
15 years 4 months ago
Extraction of crisp logical rules using constrained backpropagation networks
Two recently developed methods for extraction of crisp logical rules from neural networks trained with backpropagation algorithm are compared. Both methods impose constraints on th...
Wlodzislaw Duch, Rafal Adamczak, Krzysztof Grabcze...
105
Voted
ARSCOM
2008
117views more  ARSCOM 2008»
15 years 3 months ago
Subset Counting in Trees
Various enumeration problems for classes of simply generated families of trees have been the object of investigation in the past. We mention the enumeration of independent subsets,...
Stephan G. Wagner
133
Voted
CCR
2004
94views more  CCR 2004»
15 years 3 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
90
Voted
DAM
1999
77views more  DAM 1999»
15 years 3 months ago
Compound Constructions of Broadcast Networks
Compound methods have been shown to be very e ective in the construction of broadcast graphs. Compound methods generate a large broadcast graph by combining multiple copies of a b...
Michael J. Dinneen, Jose A. Ventura, Mark C. Wilso...