Sciweavers

1912 search results - page 342 / 383
» On the evaluation of argumentation formalisms
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
14 years 11 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
TVCG
2008
124views more  TVCG 2008»
14 years 11 months ago
Effective visualization of complex vascular structures using a non-parametric vessel detection method
The effective visualization of vascular structures is critical for diagnosis, surgical planning as well as treatment evaluation. In recent work, we have developed an algorithm for ...
Alark Joshi, Xiaoning Qian, Donald P. Dione, Ketan...
JMLR
2002
157views more  JMLR 2002»
14 years 11 months ago
Cluster Ensembles --- A Knowledge Reuse Framework for Combining Multiple Partitions
This paper introduces the problem of combining multiple partitionings of a set of objects into a single consolidated clustering without accessing the features or algorithms that d...
Alexander Strehl, Joydeep Ghosh
TOMACS
1998
140views more  TOMACS 1998»
14 years 11 months ago
Technical Note: A Hierarchical Computer Architecture Design and Simulation Environment
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...
SCFBM
2008
101views more  SCFBM 2008»
14 years 11 months ago
The MERG Suite: Tools for discovering competencies and associated learning resources
Background: As the demands for competency-based education grow, the need for standardsbased tools to allow for publishing and discovery of competency-based learning content is mor...
Ravi Teja Bhupatiraju, William R. Hersh, Valerie S...