Sciweavers

2958 search results - page 271 / 592
» Using Anonymized Data for Classification
Sort
View
IJNSEC
2006
112views more  IJNSEC 2006»
15 years 3 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
KBS
2006
79views more  KBS 2006»
15 years 3 months ago
Using multiple and negative target rules to make classifiers more understandable
One major goal for data mining is to understand data. Rule based methods are better than other methods in making mining results comprehensible. However, the current rule based cla...
Jiuyong Li, Jason Jones
KDD
1998
ACM
228views Data Mining» more  KDD 1998»
15 years 8 months ago
Direct Marketing Response Models Using Genetic Algorithms
Direct marketing response models seek to identify individuals most likely to respond to marketing solicitations. Such models are commonly evaluatedon classification accuracyand so...
Siddhartha Bhattacharyya
DCAI
2008
15 years 5 months ago
Solving the Oil Spill Problem Using a Combination of CBR and a Summarization of SOM Ensembles
. In this paper, a forecasting system is presented. It predicts the presence of oil slicks in a certain area of the open sea after an oil spill using Case-Based Reasoning methodolo...
Aitor Mata, Emilio Corchado, Bruno Baruque
EUSFLAT
2007
176views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
Modifying the Classic Peak Picking Technique Using a Fuzzy Multi Agent to Have an Accurate P300-based BCI
EEG-based brain computer interface (BCI) provides a new communication channel between the human brain and a computer. The classification of EEG data is an important task in EEG-ba...
Gholamreza Salimi Khorshidi, Ayyoub Jaafari, Ali M...