Sciweavers

648 search results - page 40 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
PKDD
2009
Springer
169views Data Mining» more  PKDD 2009»
15 years 9 months ago
Hybrid Least-Squares Algorithms for Approximate Policy Evaluation
The goal of approximate policy evaluation is to “best” represent a target value function according to a specific criterion. Temporal difference methods and Bellman residual m...
Jeffrey Johns, Marek Petrik, Sridhar Mahadevan
186
Voted
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 9 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 2 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
154
Voted
IHI
2010
143views Healthcare» more  IHI 2010»
14 years 9 months ago
Mining and monitoring patterns of daily routines for assisted living in real world settings
In this paper we demonstrate a fully automated approach for discovering and monitoring patterns of daily activities. Discovering patterns of daily activities and tracking them can...
Parisa Rashidi, Diane J. Cook
ECIR
2007
Springer
15 years 4 months ago
Combination of Document Priors in Web Information Retrieval
Query-independent features (also called document priors), such as the number of incoming links to a document, its Page-Rank, or the type of its associated URL, have been successfu...
Jie Peng, Iadh Ounis