Sciweavers

940 search results - page 65 / 188
» Rules and Strategies in Java
Sort
View
KDD
2002
ACM
148views Data Mining» more  KDD 2002»
16 years 1 months ago
Tumor cell identification using features rules
Advances in imaging techniques have led to large repositories of images. There is an increasing demand for automated systems that can analyze complex medical images and extract me...
Bin Fang, Wynne Hsu, Mong-Li Lee
99
Voted
MANSCI
2007
85views more  MANSCI 2007»
15 years 16 days ago
Probability Elicitation, Scoring Rules, and Competition Among Forecasters
Probability forecasters who are rewarded via a proper scoring rule may care not only about the score, but also about their performance relative to other forecasters. We model this...
Kenneth C. Lichtendahl Jr., Robert L. Winkler
SOUPS
2006
ACM
15 years 6 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
91
Voted
IEEECIT
2006
IEEE
15 years 6 months ago
Improving Resiliency of Network Topology with Enhanced Evolving Strategies
— Recent studies have shown that many real networks follow the power-law distribution of node degrees. Instead of random connectivity, however, power-law connectivity suffers fro...
Soo Kim, Heejo Lee, Wan Yeon Lee
118
Voted
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 20 days ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani