1 |
Hearst, M. A., S. T. Dumais, E. Osman, J. Platt, and B. Scholkopf, "Support vector machines," IEEE Intelligent System, Vol.13, No.4, pp.18-28, 1998.04.
DOI
ScienceOn
|
2 |
Hyeon-Uk Lee, Ji-Hun Kim, Hyunchul Ahn, "An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection System," Journal of Intelligence and Information System, vol.18, No.1, pp.125-141, 2012.01.
|
3 |
Hyunchul Ahn, Kyoung-jae Kim, Ingoo Han, "Purchase Prediction Model using Support Vector Machine," Journal of Intelligence and Information System, Vol.11, No.3, pp.69-81, 2005.03.
|
4 |
Korea Internet & Security Agency, "2010 Hacking ․ Virus Status and Corresponding," KISA-RP-2010- 0051, 2011.06.
|
5 |
Z. Pawlak, "Rough sets : Theoretical Aspects of Reasoning About Data," Kluwer Academic Publishers Norwell, pp.9-29, 1991
|
6 |
Wan-Seok Seo, Jae-Yearn Kim, "Discretization of Continuous Attributes based on Rough Set Theory and SOM," Journal of industrial and systems engineering, Vol.28, No.1, pp.1-7, 2005.01.
|
7 |
Jan Komorowski, Lech Polkowski, Andrzej Skowron, "Rough Sets : A Tutorial," http://secs.ceas.uc.edu/ -mazlack/dbm.w2011/Komorowski.RoughSets.tu tor.pdf
|
8 |
Z. Pawlak, "Rough sets and intelligent data analysis," Information Sciences, Vol.147, Issues 1-4, pp.1-12, 2002.12.
DOI
ScienceOn
|
9 |
Jaepil Ko, "Solving Multi-class Problem using Support Vector Machines," Journal of KISS : Software and Applications, Vol.32, No.12, pp.1260- 1270, 2005.12.
과학기술학회마을
|