Sciweavers

6087 search results - page 1170 / 1218
» Knowledge discovery methods
Sort
View
AWIC
2003
Springer
15 years 3 months ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
ECOOP
2003
Springer
15 years 3 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky
EUROCRYPT
2003
Springer
15 years 3 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
15 years 3 months ago
Using Genetic Algorithms for Data Mining Optimization in an Educational Web-Based System
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...
Behrouz Minaei-Bidgoli, William F. Punch
BIBM
2009
IEEE
172views Bioinformatics» more  BIBM 2009»
15 years 2 months ago
Identifying Gene Signatures from Cancer Progression Data Using Ordinal Analysis
—A comprehensive understanding of cancer progression may shed light on genetic and molecular mechanisms of oncogenesis, and it may provide much needed information for effective d...
Yoon Soo Pyon, Jing Li
« Prev « First page 1170 / 1218 Last » Next »