Sciweavers

1737 search results - page 98 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ISSE
2010
14 years 10 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
KDD
1995
ACM
98views Data Mining» more  KDD 1995»
15 years 3 months ago
Optimization and Simplification of Hierarchical Clusterings
Clustering is often used to discover structure in data. Clustering systems differ in the objective function used to evaluate clustering quality and the control strategy used to se...
Douglas Fisher
DSN
2006
IEEE
15 years 3 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
ICPR
2010
IEEE
15 years 5 months ago
Social Network Approach to Analysis of Soccer Game
Video understanding has been an active area of research, where many articles have been published on how to detect and track objects in videos, and how to analyze their trajectorie...
Kyoung-Jin Park, Alper Yilmaz
TNN
2010
171views Management» more  TNN 2010»
14 years 6 months ago
Sensitivity versus accuracy in multiclass problems using memetic Pareto evolutionary neural networks
This paper proposes a multiclassification algorithm using multilayer perceptron neural network models. It tries to boost two conflicting main objectives of multiclassifiers: a high...
Juan Carlos Fernández Caballero, Francisco ...