Sciweavers

7928 search results - page 1509 / 1586
» Human-Like Learning Methods for a
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 4 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
146
Voted
IJRR
2008
113views more  IJRR 2008»
15 years 4 months ago
Flying Fast and Low Among Obstacles: Methodology and Experiments
Safe autonomous flight is essential for widespread acceptance of aircraft that must fly close to the ground. We have developed a methodology of collision avoidance that can be use...
Sebastian Scherer, Sanjiv Singh, Lyle Chamberlain,...
IJSI
2008
115views more  IJSI 2008»
15 years 4 months ago
Towards Knowledge Acquisition from Semi-Structured Content
Abstract A rich family of generic Information Extraction (IE) techniques have been developed by researchers nowadays. This paper proposes WebKER, a system for automatically extract...
Xi Bai, Jigui Sun, Haiyan Che, Lian Shi
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
15 years 4 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
IJAIT
2006
121views more  IJAIT 2006»
15 years 4 months ago
An Efficient Feature Selection Algorithm for Computer-aided Polyp Detection
We present an efficient feature selection algorithm for computer aided detection (CAD) computed tomographic (CT) colonography. The algorithm 1) determines an appropriate piecewise...
Jiang Li, Jianhua Yao, Ronald M. Summers, Nicholas...
« Prev « First page 1509 / 1586 Last » Next »