Sciweavers

934 search results - page 45 / 187
» Anomaly Detection Using Visualization and Machine Learning
Sort
View
ECTEL
2010
Springer
14 years 7 months ago
GVIS: A Facility for Adaptively Mashing Up and Representing Open Learner Models
In this article we present an infrastructure for creating mash up and visual representations of the user profile that combine data from different sources. We explored this approach...
Luca Mazzola, Riccardo Mazza
ECCV
2008
Springer
15 years 11 months ago
Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks
Abstract. Building visual recognition models that adapt across different domains is a challenging task for computer vision. While feature-learning machines in the form of hierarchi...
Amr Ahmed, Kai Yu, Wei Xu, Yihong Gong, Eric P. Xi...
USENIX
2003
14 years 11 months ago
Learning Spam: Simple Techniques For Freely-Available Software
The problem of automatically filtering out spam e-mail using a classifier based on machine learning methods is of great recent interest. This paper gives an introduction to mach...
Bart Massey, Mick Thomure, Raya Budrevich, Scott L...
JAIR
2010
181views more  JAIR 2010»
14 years 4 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
ICCS
2007
Springer
15 years 4 months ago
Active Learning with Support Vector Machines for Tornado Prediction
In this paper, active learning with support vector machines (SVMs) is applied to the problem of tornado prediction. This method is used to predict which storm-scale circulations yi...
Theodore B. Trafalis, Indra Adrianto, Michael B. R...