Sciweavers

2111 search results - page 175 / 423
» An Approach to Software Testing of Machine Learning Applicat...
Sort
View
ICSE
2007
IEEE-ACM
16 years 3 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
ICPR
2004
IEEE
16 years 4 months ago
Feature Subset Selection using ICA for Classifying Emphysema in HRCT Images
Feature subset selection, applied as a pre-processing step to machine learning, is valuable in dimensionality reduction, eliminating irrelevant data and improving classifier perfo...
Mithun Nagendra Prasad, Arcot Sowmya, Inge Koch
MODELLIERUNG
2004
15 years 5 months ago
Modeling Socio-Technical Processes in e-Commerce Scenarios
: We consider socio-technical processes, i.e. processes where machines as well as humans participate. Typical examples occur in sales processes in e-commerce. Three modeling tasks ...
Michael M. Richter, Armin Stahl
ICANN
2007
Springer
15 years 10 months ago
Unbiased SVM Density Estimation with Application to Graphical Pattern Recognition
Abstract. Classification of structured data (i.e., data that are represented as graphs) is a topic of interest in the machine learning community. This paper presents a different,...
Edmondo Trentin, Ernesto Di Iorio
ISMIS
2005
Springer
15 years 9 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...