Login / Signup
Selection of an EAP authentication method for a WLAN.
Khidir M. Ali
Thomas J. Owens
Published in:
Int. J. Inf. Comput. Secur. (2007)
Keyphrases
</>
significant improvement
dynamic programming
preprocessing
data sets
computational complexity
feature space
computational cost
high accuracy
clustering method
synthetic data
high precision
neural network
genetic algorithm
cost function
support vector machine
segmentation method