Sciweavers

989 search results - page 124 / 198
» Analyzing Knowledge Management Systems: A Veritistic Approac...
Sort
View
CIKM
2008
Springer
15 years 1 months ago
To swing or not to swing: learning when (not) to advertise
Web textual advertising can be interpreted as a search problem over the corpus of ads available for display in a particular context. In contrast to conventional information retrie...
Andrei Z. Broder, Massimiliano Ciaramita, Marcus F...
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 12 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
ACSAC
2001
IEEE
15 years 3 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
KDD
2003
ACM
149views Data Mining» more  KDD 2003»
16 years 7 days ago
Knowledge-based data mining
We describe techniques for combining two types of knowledge systems: expert and machine learning. Both the expert system and the learning system represent information by logical d...
Søren Damgaard, Sholom M. Weiss, Shubir Kap...
ICML
2003
IEEE
16 years 20 days ago
Exploration and Exploitation in Adaptive Filtering Based on Bayesian Active Learning
In the task of adaptive information filtering, a system receives a stream of documents but delivers only those that match a person's information need. As the system filters i...
Yi Zhang, Wei Xu, James P. Callan