Sciweavers

669 search results - page 46 / 134
» critical 2005
Sort
View
COMCOM
2006
79views more  COMCOM 2006»
14 years 12 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
IJON
2006
134views more  IJON 2006»
14 years 11 months ago
A new approach to fuzzy classifier systems and its application in self-generating neuro-fuzzy systems
A classifier system is a machine learning system that learns syntactically simple string rules (called classifiers) through a genetic algorithm to guide its performance in an arbi...
Mu-Chun Su, Chien-Hsing Chou, Eugene Lai, Jonathan...
RAS
2006
110views more  RAS 2006»
14 years 11 months ago
A methodology for provably stable behaviour-based intelligent control
This paper presents a design methodology for a class of behaviour-based control systems, arguing its potential for application to safety critical systems. We propose a formal basi...
Christopher J. Harper, Alan F. T. Winfield
BMCBI
2005
110views more  BMCBI 2005»
14 years 11 months ago
Considerations when using the significance analysis of microarrays (SAM) algorithm
Background: Users of microarray technology typically strive to use universally acceptable data analysis strategies to determine significant expression changes in their experiments...
Ola Larsson, Claes Wahlestedt, James A. Timmons
BMCBI
2005
90views more  BMCBI 2005»
14 years 11 months ago
Text Detective: a rule-based system for gene annotation in biomedical texts
Background: The identification of mentions of gene or gene products in biomedical texts is a critical step in the development of text mining applications in biosciences. The compl...
Javier Tamames