Sciweavers

776 search results - page 46 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
ECTEL
2008
Springer
15 years 3 months ago
Knowledge Practices Environment: Design and Application of Technology for Trialogical Learning
Current networked society present learners with challenges that cannot be sufficiently coped with in educational contexts that are characterized by transmission or participation ep...
Patrick Sins, Merja Bauters, Crina Damsa
DASFAA
2008
IEEE
149views Database» more  DASFAA 2008»
15 years 3 months ago
A Test Paradigm for Detecting Changes in Transactional Data Streams
A pattern is considered useful if it can be used to help a person to achieve his goal. Mining data streams for useful patterns is important in many applications. However, data stre...
Willie Ng, Manoranjan Dash
ACSAC
2008
IEEE
15 years 8 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ICPR
2004
IEEE
16 years 3 months ago
Learning Sample Subspace with Application to Face Detection
In this paper, we present a novel maximum correlation sample subspace method and apply it to human face detection [1] in still images. The algorithm starts by projecting all the t...
Guoping Qiu, Jianzhong Fang
EMNLP
2011
14 years 1 months ago
Watermarking the Outputs of Structured Prediction with an application in Statistical Machine Translation
We propose a general method to watermark and probabilistically identify the structured outputs of machine learning algorithms. Our method is robust to local editing operations and...
Ashish Venugopal, Jakob Uszkoreit, David Talbot, F...