|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
Data modeling
Computer intrusion detection
Cross validation
Mathematical optimization
Extreme learning machines
Genetic algorithms
Network security