In Tu-Bao Ho & Zhi-Hua Zhou (eds.), Pricai 2008: Trends in Artificial Intelligence. Springer. pp. 1053--1058 (2008)

Abstract This article has no associated abstract. (fix it)
Keywords No keywords specified (fix it)
Categories (categorize this paper)
Buy the book Find it on Amazon.com
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 72,607
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

No references found.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

Network Management of Predictive Mobile Networks.Stephen Bush, Frost F., S. Victor, Joseph Evans & B. - 1999 - Journal of Network and Systems Management 7 (2).
Mobile ATM Buffer Capacity Analysis.Stephen Bush, Evans F., B. Joseph & Victor Frost - 1996 - Acm-Baltzer Mobile Networks and Nomadic Applications 1 (1):67--73.
An Unsupervised Clustering Algorithm for Intrusion Detection.G. Yu, A. G. Ali & B. Nabil - forthcoming - Proc. Of the 16th Conference of the Canadian Society for Computational Studies of Intelligence (Ai 2003), Halifax, Nova Scotia, Canada.
Privacy in (Mobile) Telecommunications Services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Creation of Rules Replacing Sets of Rules.Wiestaw Traczyk - 1996 - Esda 1996: Expert Systems and Ai; Neural Networks 7:107.

Analytics

Added to PP index
2014-01-30

Total views
34 ( #339,446 of 2,533,662 )

Recent downloads (6 months)
1 ( #389,210 of 2,533,662 )

How can I increase my downloads?

Downloads

My notes