نتایج جستجو برای: heuristic rule

تعداد نتایج: 208558  

2010
Aris Gkoulalas-Divanis Vassilios S. Verykios

The best ebooks about Association Rule Hiding For Data Mining that you can get for free here by download this Association Rule Hiding For Data Mining and save to your desktop. This ebooks is under topic such as association rule hiding for data mining springer association rule hiding for data mining advances in association rule hiding knowledge and data engineering an efficient association rule ...

Journal: :Information 2021

This paper introduces a new and expressive algorithm for inducing descriptive rule-sets from streaming data in real-time order to describe frequent patterns explicitly encoded the stream. Data Stream Mining (DSM) is concerned with automatic analysis of streams real-time. Rapid flows challenge state-of-the art processing communication infrastructure, hence motivation research innovation into alg...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم ریاضی و مهندسی کامپیوتر 1392

heuristics are often used to provide solutions for flow shop scheduling problems.the performance of a heuristic is usually judged by comparing solutions and run times on test cases.this investigation proposes an analytical alternative ,called asymptotic convergence ,which tests the convergence of the heuristic to a lower bound as problem size grows. the test is a stronger variation of worst cas...

2010
Carmel Domshlak Erez Karpas Shaul Markovitch

It is well known that there cannot be a single “best” heuristic for optimal planning in general. One way of overcoming this is by combining admissible heuristics (e.g. by using their maximum), which requires computing numerous heuristic estimates at each state. However, there is a tradeoff between the time spent on computing these heuristic estimates for each state, and the time saved by reduci...

2003
Maheshkumar Sabhnani Gürsel Serpen

This paper proposes a heuristic rule for detection of user-to-root (U2R) attacks against Solaris TM operating system. Relevant features for developing heuristic rules were manually mined using Solaris TM Basic Security Module audit data. The proposed rule was tested on both DARPA 1998 and 1999 intrusion detection datasets. Results show that all user-to-root attacks exploiting the suid program w...

2003
Daniel Schunk

In previous lectures, we have discussed that people often use so-called heuristics, e.g. anchoring and the representativeness heuristic, instead of behaving completely rationally. The present lecture, which is based on a paper by Seale and Rapoport (1997), shows how an experiment and a computer-simulation-study can be used to find out what decision rule/heuristic people use in a certain optimal...

2012
Jian Gao Rong Chen

Distributed Permutation Flowshop Scheduling Problem (DPFSP) is a newly proposed scheduling problem with a strong engineering background. Whereas there is a body of work on scheduling problems in the past decades, the literature on DPFSPs is scant and in its infancy. Motivated by the good performances of some heuristics in a very recent work, we propose a constructive heuristic algorithm enhance...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید