Sciweavers

5518 search results - page 21 / 1104
» Rule-Based Service Modeling
Sort
View
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 3 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
ECSQARU
2005
Springer
15 years 3 months ago
Generating Fuzzy Models from Deep Knowledge: Robustness and Interpretability Issues
The most problematic and challenging issues in fuzzy modeling of nonlinear system dynamics deal with robustness and interpretability. Traditional data-driven approaches, especially...
Raffaella Guglielmann, Liliana Ironi
SAFECOMP
2007
Springer
15 years 3 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
APIN
1998
98views more  APIN 1998»
14 years 9 months ago
A Fuzzy Diagnostic Model and Its Application in Automotive Engineering Diagnosis
This paper describes a fuzzy diagnostic model that contains a fast fuzzy rule generation algorithm and a priority rule based inference engine. The fuzzy diagnostic model has been i...
Yi Lu, Tie Qi Chen, Brennan Hamilton
NAACL
1994
14 years 11 months ago
Japanese Word Segmentation by Hidden Markov Model
The processing of Japanese text is complicated by the fact that there are no word delimiters. To segment Japanese text, systems typically use knowledge-based methods and large lex...
Constantine Papageorgiou