Sciweavers

3011 search results - page 407 / 603
» Generating XML Based Specifications of Information Systems
Sort
View
GECCO
2010
Springer
186views Optimization» more  GECCO 2010»
15 years 2 months ago
Genetic rule extraction optimizing brier score
Most highly accurate predictive modeling techniques produce opaque models. When comprehensible models are required, rule extraction is sometimes used to generate a transparent mod...
Ulf Johansson, Rikard König, Lars Niklasson
SACMAT
2006
ACM
15 years 7 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 6 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
116
Voted
BMCBI
2008
126views more  BMCBI 2008»
15 years 1 months ago
FCI: an R-based algorithm for evaluating uncertainty of absolute real-time PCR quantification
Background: FCI is an R code for analyzing data from real-time PCR experiments. This algorithm estimates standard curve features as well as nucleic acid concentrations and confide...
Paolo Verderio, Sara Pizzamiglio, Fabio Gallo, Sim...
148
Voted
DOLAP
2010
ACM
14 years 11 months ago
Towards OLAP query reformulation in peer-to-peer data warehousing
Inter-business collaborative contexts prefigure a distributed scenario where companies organize and coordinate themselves to develop common and shared opportunities. Traditional b...
Matteo Golfarelli, Federica Mandreoli, Wilma Penzo...