![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Cohen S. Intrator N.
Publisher: Elsevier
ISSN: 1566-2535
Source: Information Fusion, Vol.3, Iss.4, 2002-12, pp. : 259-266
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Cao Jie Cao Guo Wang Weiwei
Kybernetes: The International Journal of Systems & Cybernetics, Vol. 41, Iss. 7-8, 2012-08 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
A Hybrid Network Emergency Communication Model
International Journal of Handheld Computing Research (IJHCR), Vol. 4, Iss. 2, 2013-04 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Automatic model selection in cost-sensitive boosting
By Merler S. Furlanello C. Larcher B. Sboner A.
Information Fusion, Vol. 4, Iss. 1, 2003-03 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Privacy preserving perceptron learning in malicious model
Neural Computing & Applications, Vol. 23, Iss. 3-4, 2013-09 ,pp. :