منابع مشابه
Classifying Classification
Different types of linguistic classification, ranging from simple inheritance hierarchies to systemic networks, are classified algebraically and order-theoretically. To this end, classifications are reformulated as observational theories. Classifications that do not involve disjunction correspond to Horn theories, whose generic universe ordered by specialization is known to be a Scott domain. S...
متن کاملText Classification: Classifying Plain Source Files with Neural Network
The automated text file categorization has an important place in computer engineering, particularly in the process called data management automation. A lot has been written about text classification and the methods allowing classification of these files are well known. Unfortunately most studies are theoretical and for practical implementation more research is needed. I decided to contribute wi...
متن کاملMRI reliability in classifying thoracolumbar fractures according to AO classification.
The vertebral fracture patterns of AO classification have been established historically via radiograph and computed tomography analysis, achieving modest reproducibility values. The authors hypothesize that magnetic resonance imaging may improve reliability because it better indicates posterior ligamentous complex damage. They conducted a retrospective analysis of a prospective recruited cohort...
متن کاملStudying of Classifying Chinese Sms Messages Based on Bayesian Classification
Although there are a lot of researches about e-mail spam filters, only a few focus on the issue for SMS (Short Message Service) system, especially in Chinese. In this paper, we proposed a two-layer filter model based on Naïve Bayes classifier utilizing both some traditional filter rules and content filter technical. The experimental results illustrate that the two-layer filter model can enhance...
متن کاملMulti-classification approaches for classifying mobile app traffic
The growing usage of smartphones in everyday life is deeply (and rapidly) changing the nature of traffic traversing home and enterprise networks, and the Internet. Different tools and middleboxes, such as performance enhancement proxies, network monitors and policy enforcement devices, base their functions on the knowledge of the applications generating the traffic. This requirement is tightly ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2004
ISSN: 1571-0661
DOI: 10.1016/s1571-0661(05)82587-3