Sciweavers

1110 search results - page 163 / 222
» Information Fusion for Intelligence Analysis
Sort
View
CEC
2009
IEEE
15 years 8 months ago
Coevolution of simulator proxies and sampling strategies for petroleum reservoir modeling
— Reservoir modeling is an on-going activity during the production life of a reservoir. One challenge to constructing accurate reservoir models is the time required to carry out ...
Tina Yu, Dave Wilkinson
97
Voted
ESAW
2009
Springer
15 years 8 months ago
Determining the Trustworthiness of New Electronic Contracts
Expressing contractual agreements electronically potentially allows agents to automatically perform functions surrounding contract use: establishment, fulfilment, renegotiation et...
Paul T. Groth, Simon Miles, Sanjay Modgil, Nir Ore...
CIDM
2007
IEEE
15 years 8 months ago
Mining Subspace Correlations
— In recent applications of clustering such as gene expression microarray analysis, collaborative filtering, and web mining, object similarity is no longer measured by physical ...
Rave Harpaz, Robert M. Haralick
96
Voted
CIDM
2007
IEEE
15 years 8 months ago
Handwritten Digit, Recognition Road to Contest victory
— With growing amount of data gathered nowadays, the need for efficient data mining methodologies is getting more and more common. There is a large number of different classifi...
Norbert Jankowski, Krzysztof Grabczewski
IAT
2007
IEEE
15 years 8 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...