Sciweavers

3750 search results - page 530 / 750
» Timed Automata Patterns
Sort
View
JASIS
2000
143views more  JASIS 2000»
15 years 3 months ago
Discovering knowledge from noisy databases using genetic programming
s In data mining, we emphasize the need for learning from huge, incomplete and imperfect data sets (Fayyad et al. 1996, Frawley et al. 1991, Piatetsky-Shapiro and Frawley, 1991). T...
Man Leung Wong, Kwong-Sak Leung, Jack C. Y. Cheng
RAID
2010
Springer
15 years 1 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
RCIS
2010
15 years 1 months ago
A Tree-based Approach for Efficiently Mining Approximate Frequent Itemsets
—The strategies for mining frequent itemsets, which is the essential part of discovering association rules, have been widely studied over the last decade. In real-world datasets,...
Jia-Ling Koh, Yi-Lang Tu
MASS
2010
133views Communications» more  MASS 2010»
15 years 1 months ago
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure
Abstract--Spread spectrum techniques (e.g., Frequency Hopping (FH), Direct Sequence Spread Spectrum (DSSS)) have been widely used for anti-jamming wireless communications. Such tec...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu
TCBB
2010
144views more  TCBB 2010»
14 years 10 months ago
Querying Graphs in Protein-Protein Interactions Networks Using Feedback Vertex Set
Recent techniques increase rapidly the amount of our knowledge on interactions between proteins. The interpretation of these new information depends on our ability to retrieve kno...
Guillaume Blin, Florian Sikora, Stéphane Vi...