Sciweavers

32032 search results - page 6232 / 6407
» Verified programming in Guru
Sort
View
CSREASAM
2006
15 years 1 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
ESANN
2004
15 years 1 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk
125
Voted
DMIN
2006
126views Data Mining» more  DMIN 2006»
15 years 1 months ago
Comparison and Analysis of Mutation-based Evolutionary Algorithms for ANN Parameters Optimization
Mutation-based Evolutionary Algorithms, also known as Evolutionary Programming (EP) are commonly applied to Artificial Neural Networks (ANN) parameters optimization. This paper pre...
Kristina Davoian, Alexander Reichel, Wolfram-Manfr...
IASTEDSE
2004
15 years 1 months ago
A symbolic Java virtual machine for test case generation
Quality management is becoming a more and more important part of the software development process. As software testing is currently understood as the core function of the quality ...
Roger A. Müller, Christoph Lembeck, Herbert K...
83
Voted
ICAD
2004
15 years 1 months ago
Listening to the Mind Listening
The following explains what mappings have been chosen for a sonification of several data channels from set containing a recording of the neural activity of a person listening to a...
Hans Van Raaij
« Prev « First page 6232 / 6407 Last » Next »