We present a text mining method called CORDER [4] which discovers social networks from an organization’s documents. CORDER finds relations between a target named entity and othe...
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
We introduce a simple asset pricing model with two types of adaptively learning traders, fundamentalists and technical traders. Traders update their beliefs according to past perfo...
Emerging Web standards promise a network of heterogeneous yet interoperable Web Services. Web Services would greatly simplify the development of many kinds of data integration and...
We introduce a new learning algorithm for topographic map formation of Edgeworth-expanded Gaussian activation kernels. In order to avoid the rapid increase in kernel parameters, a...