The development of microarray-based high-throughput gene expression has led to the hope that this technology could provide an efficient cancer diagnosis and classification platform. A major problem in these gene expre...
详细信息
Gene expression data are expected to be of significant help in the development of efficient cancer diagnosis and classification platforms. One problem arising from these data is how to select a small subset of genes f...
详细信息
In complex and dynamic environments where interdependencies cannot monotonously determine causality, data mining techniques may be employed in order to analyze the problem, extract key features and identify pivotal fa...
详细信息
There exist several application scenarios of mobile ad hoc networks (MANET) in which the nodes need to locate a target or surround it. Severe resource constraints in MANETs call for energy efficient target localizatio...
详细信息
The focus of this paper is a construction of better knowledge base in case-based classifier system. Our knowledge base structure is based on concept lattice where rules are built from its subconcept-superconcept relat...
详细信息
ISBN:
(纸本)9781605580463
The focus of this paper is a construction of better knowledge base in case-based classifier system. Our knowledge base structure is based on concept lattice where rules are built from its subconcept-superconcept relation. Since the lattice can only be constructed from inputs with binary attributes, descriptive and numeric attributes must be transformed to binary attributes. In this paper, we propose the transformation of numeric attributes to descriptive attributes using fuzzy set theory. We experiment on benchmark data sets, Car and Iris, to determine the performance in term of number of rules used and classification precision. The results show that trend of accuracy is proportional to the size of learning inputs. The number of rules used is relatively small compared with size of training data. Our case-based classifier produces very promising results in practice and can classify the new problem more accurate than traditional classifiers. Copyright 2008 ACM.
We model the Sum and Product Riddle inpublic announcement logic, which is interpreted on an epistemic Kripke model. The model is symbolically represented as a finite state program with n agents. A model checking metho...
详细信息
Camera handoff is a crucial step to generate a continuously tracked and consistently labeled trajectory of the object of interest in multi-camera surveillance systems. Most existing camera handoff algorithms concentra...
详细信息
Rootkits are stealthy, malicious software that allow an attacker to gain and maintain control of a computing system through an attack the operating system core or kernel, attack other computersystems, and destroy evi...
详细信息
ISBN:
(纸本)9781604232356
Rootkits are stealthy, malicious software that allow an attacker to gain and maintain control of a computing system through an attack the operating system core or kernel, attack other computersystems, and destroy evidence of tampering to decrease the chance of detection. Rootkit attacks have expanded greatly since they were initially detected in the early 1990s. Existing detection methods typically rely upon substantial background knowledge about the structure and organization of the operating system prior to any attacks. This paper presents a new approach to rootkit detection using greatly reduced a priori knowledge in the form of statistical knowledge of the operating system and statistical tests for outliers. This new detection approach is discussed in detail, along with experimental results from rootkit detection in Windows operating systems.
Considering the impact of aggregation cost on the performance of aggregation routes in wireless sensor networks, an aggregation-decision-based distributed routing algorithm for data aggregation is proposed. When sourc...
详细信息
Considering the impact of aggregation cost on the performance of aggregation routes in wireless sensor networks, an aggregation-decision-based distributed routing algorithm for data aggregation is proposed. When source nodes arrive or leave, the algorithm can calculate the aggregation benefit according to data correlation, aggregation cost and transmission cost. Then the algorithm will adaptively make aggregation and routing decisions based on aggregation benefit. Therefore, it can jointly optimize the aggregation and transmission costs and reduce the energy consumption for data gathering. This distributed algorithm makes all the decisions only relying on the local information. Hence, the routing maintenance cost is limited. Simulation results show that the energy consumption difference between this distributed online algorithm and the previous offline one is within 17% under any network conditions.
Target tracking and localization are important applications in camera sensor networks. Although coverage is a very important research topic in wireless sensor networks, and the coverage problem for target detection ha...
详细信息
暂无评论