Sciweavers

1456 search results - page 207 / 292
» Keeping encountered information
Sort
View
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 5 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
NORDICHI
2004
ACM
15 years 5 months ago
Two psychology-based usability inspection techniques studied in a diary experiment
Inspection techniques are widely used during systems design as a supplement to empirical evaluations of usability. Psychology-based inspection techniques could give important insi...
Kasper Hornbæk, Erik Frøkjær
AUSAI
2004
Springer
15 years 5 months ago
Set Bounds and (Split) Set Domain Propagation Using ROBDDs
Most propagation-based set constraint solvers approximate the set of possible sets that a variable can take by upper and lower bounds, and perform so-called set bounds propagation....
Peter Hawkins, Vitaly Lagoon, Peter J. Stuckey
GECCO
2004
Springer
125views Optimization» more  GECCO 2004»
15 years 5 months ago
Population-Based Iterated Local Search: Restricting Neighborhood Search by Crossover
Abstract. Iterated local search (ILS) is a powerful meta-heuristic algorithm applied to a large variety of combinatorial optimization problems. Contrary to evolutionary algorithms ...
Dirk Thierens
HUC
2004
Springer
15 years 5 months ago
Designing Capture Applications to Support the Education of Children with Autism
We explore the social and technical design issues involved in tracking the effectiveness of educational and therapeutic interventions for children with autism (CWA). Automated capt...
Gillian R. Hayes, Julie A. Kientz, Khai N. Truong,...