Sciweavers

1922 search results - page 306 / 385
» ie 2007
Sort
View
ESANN
2004
14 years 11 months ago
Forbidden magnification? II
The twin of this paper, "Forbidden Magnification? I." [1], presents systematic SOM simulations with the explicit magnification control scheme of Bauer, Der, and Herrmann ...
Erzsébet Merényi, Abha Jain
DMIN
2006
126views Data Mining» more  DMIN 2006»
14 years 11 months ago
Comparison and Analysis of Mutation-based Evolutionary Algorithms for ANN Parameters Optimization
Mutation-based Evolutionary Algorithms, also known as Evolutionary Programming (EP) are commonly applied to Artificial Neural Networks (ANN) parameters optimization. This paper pre...
Kristina Davoian, Alexander Reichel, Wolfram-Manfr...
IFIP12
2004
14 years 11 months ago
An Adaptive Assessment System to Evaluate Student Ability Level
: The experience from years of development and use, the advance of technology, and the development of authoring tools for questions and tests has resulted in a sophisticated, compu...
Antonella Carbonaro, Giorgio Casadei, Simone Riccu...
CSREASAM
2003
14 years 11 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
LWA
2004
14 years 11 months ago
VISION - a Semantic Web Portal for Describing the State-of-the-art on European Knowledge Management
For the realization of this strategic roadmap project a scenario-driven approach has been used, i.e. several scenarios for possible future applications concerning KM have been deve...
Mark Hefke