Sciweavers

206 search results - page 16 / 42
» Network selection using fuzzy logic
Sort
View
77
Voted
FUZZIEEE
2007
IEEE
15 years 4 months ago
Tolerance-based and Fuzzy-Rough Feature Selection
— One of the main obstacles facing the application of computational intelligence technologies in pattern recognition (and indeed in many other tasks) is that of dataset dimension...
Richard Jensen, Qiang Shen
FSKD
2008
Springer
128views Fuzzy Logic» more  FSKD 2008»
14 years 10 months ago
Applying Fuzzy PROMETHEE Method for Evaluating IS Outsourcing Suppliers
The demand for outsourcing in the information systems (IS) field has become a part of basic corporate strategy and has experienced a considerable growth in recent years. The proce...
Tien-Chin Wang, L. Y. Chen, Ying-Hsiu Chen
ENGL
2007
109views more  ENGL 2007»
14 years 9 months ago
Using Neural Network for DJIA Stock Selection
—This paper presents methodologies to select equities based on soft-computing models which focus on applying fundamental analysis for equities screening. This paper compares the ...
Tong-Seng Quah
IAW
2003
IEEE
15 years 2 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ICC
2007
IEEE
15 years 4 months ago
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...
Zouheir Trabelsi, Wasim El-Hajj