Sciweavers

4947 search results - page 675 / 990
» Learning Module Networks
Sort
View
122
Voted
KDD
2002
ACM
171views Data Mining» more  KDD 2002»
16 years 1 months ago
Mining complex models from arbitrarily large databases in constant time
In this paper we propose a scaling-up method that is applicable to essentially any induction algorithm based on discrete search. The result of applying the method to an algorithm ...
Geoff Hulten, Pedro Domingos
221
Voted
ARTCOM
2009
IEEE
15 years 8 months ago
ANFIS Approach for Navigation of Mobile Robots
— This paper, discusses about navigation control of mobile robot using adaptive neuro-fuzzy inference system (ANFIS) in a real word dynamic environment. In the ANFIS controller a...
Mukesh Kumar Singh, Dayal R. Parhi, Jayanta Kumar ...
114
Voted
MSWIM
2009
ACM
15 years 8 months ago
Socially conscious channel selection in 802.11 WLANs for coexistence in a non-cooperative environment
The increasing number of independent IEEE 802.11 WLANs owned and managed by autonomous users has led to increased interference, resulting in performance degradation and unfairness...
Joo Ghee Lim, Chun Tung Chou, Sanjay Jha
87
Voted
NOSSDAV
2009
Springer
15 years 7 months ago
Rapid identification of Skype traffic flows
In this paper we present results of experimental work using machine learning techniques to rapidly identify Skype traffic. We show that Skype traffic can be identified by observin...
Philip Branch, Amiel Heyde, Grenville J. Armitage
103
Voted
NDSS
2007
IEEE
15 years 7 months ago
Fig: Automatic Fingerprint Generation
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running ...
Shobha Venkataraman, Juan Caballero, Pongsin Poosa...