Sciweavers

3233 search results - page 210 / 647
» Validation Method for Intelligent Systems
Sort
View
140
Voted
ESORICS
2006
Springer
15 years 7 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
132
Voted
ACSW
2004
15 years 5 months ago
A wavelet-based neuro-fuzzy system for data mining small image sets
Creating a robust image classification system depends on having enough data with which one can adequately train and validate the model. If there is not enough available data, this...
Brendon J. Woodford, Da Deng, George L. Benwell
133
Voted
IQ
2004
15 years 5 months ago
An Algebraic Approach to Quality Metrics for Customer Recognition Systems
: Success in implementing a Customer Relationship Management (CRM) system requires close attention to data quality issues. However, most of the literature focuses on the quality of...
John R. Talburt, Kimberly Hess, Richard Wang, Emil...
104
Voted
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
15 years 9 months ago
Stress testing real-time systems with genetic algorithms
Reactive real-time systems have to react to external events within time constraints: Triggered tasks must execute within deadlines. The goal of this article is to automate, based ...
Lionel C. Briand, Yvan Labiche, Marwa Shousha
124
Voted
IPPS
2003
IEEE
15 years 9 months ago
Modeling Parallel Applications Performance on Heterogeneous Systems
The current technologies have made it possible to execute parallel applications across heterogeneous platforms. However, the performance models available do not provide adequate m...
Jameela Al-Jaroodi, Nader Mohamed, Hong Jiang, Dav...