Sciweavers

318 search results - page 14 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
EJWCN
2011
197views more  EJWCN 2011»
14 years 5 months ago
Comparison among Cognitive Radio Architectures for Spectrum Sensing
Recently, the growing success of new wireless applications and services has led to overcrowded licensed bands, inducing the governmental regulatory agencies to consider more flex...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...
CCS
2009
ACM
15 years 4 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
MTA
2007
113views more  MTA 2007»
14 years 9 months ago
A framework for a video analysis tool for suspicious event detection
This paper proposes a framework to aid video analysts in detecting suspicious activity within the tremendous amounts of video data that exists in today’s world of omnipresent su...
Gal Lavee, Latifur Khan, Bhavani M. Thuraisingham
EDM
2010
121views Data Mining» more  EDM 2010»
14 years 8 months ago
Identifying Students' Inquiry Planning Using Machine Learning
This research investigates the detection of student meta-cognitive planning processes in real-time using log tracing techniques. We use fine and coarse-grained data distillation, i...
Orlando Montalvo, Ryan Shaun Joazeiro de Baker, Mi...
BMCBI
2010
140views more  BMCBI 2010»
14 years 7 months ago
An improved machine learning protocol for the identification of correct Sequest search results
Background: Mass spectrometry has become a standard method by which the proteomic profile of cell or tissue samples is characterized. To fully take advantage of tandem mass spectr...
Morten Kallberg, Hui Lu