Sciweavers

776 search results - page 118 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
NIPS
2001
15 years 3 months ago
Improvisation and Learning
This article presents a 2-phase computational learning model and application. As a demonstration, a system has been built, called CHIME for Computer Human Interacting Musical Enti...
Judy A. Franklin
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
16 years 2 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
AINA
2010
IEEE
15 years 7 months ago
Minimizing Execution Costs when Using Globally Distributed Cloud Services
Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. However, Cloud service providers ch...
Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajk...
CEAS
2008
Springer
15 years 4 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
NN
2007
Springer
112views Neural Networks» more  NN 2007»
15 years 1 months ago
An augmented CRTRL for complex-valued recurrent neural networks
Real world processes with an “intensity” and “direction” component can be made complex by convenience of representation (vector fields, radar, sonar), and their processin...
Su Lee Goh, Danilo P. Mandic