Sciweavers

7053 search results - page 1312 / 1411
» Data Mining
Sort
View
ICEIS
2008
IEEE
15 years 10 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
IJCNN
2008
IEEE
15 years 10 months ago
A neural network approach to ordinal regression
— Ordinal regression is an important type of learning, which has properties of both classification and regression. Here we describe an effective approach to adapt a traditional ...
Jianlin Cheng, Zheng Wang, Gianluca Pollastri
ICALT
2007
IEEE
15 years 10 months ago
The Design of e-Learning Environment Oriented for Personalized Adaptability
A design of e-Learning environment is described for personalized adaptability. At first, we explain the whole system of our learning management system, WebClass RAPSODY, which has...
Toshie Ninomiya, Ken Nakayama, Miyuki Shimizu, Fum...
ICDE
2007
IEEE
179views Database» more  ICDE 2007»
15 years 10 months ago
A New ILP-based Concept Discovery Method for Business Intelligence
In this work, we propose a multi-relational concept discovery method for business intelligence applications. Multi-relational data mining finds interesting patterns that span ove...
Seda Daglar Toprak, Pinar Senkul, Yusuf Kavurucu, ...
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
« Prev « First page 1312 / 1411 Last » Next »