Sciweavers

1159 search results - page 137 / 232
» Decision rules and decision markets
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
TYPES
1999
Springer
15 years 2 months ago
Information Retrieval in a Coq Proof Library Using Type Isomorphisms
We propose a method to search for a lemma in a goq proof library by using the lemma type as a key. The method is based on the concept of type isomorphism developed within the funct...
David Delahaye
AUSDM
2006
Springer
157views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Safely Delegating Data Mining Tasks
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Ling Qiu, Kok-Leong Ong, Siu Man Lui
CAISE
2006
Springer
15 years 1 months ago
Experiences with Modeling and Verification of Regulations
Information system models commonly describe organizations in terms of the structure of the data they use, the organization of the processes they perform and the operations that wil...
Jan Vanthienen, Christophe Mues, Stijn Goedertier
IJCAI
1989
14 years 11 months ago
Generating Facts From Opinions with Information Source Models
This paper describes an attempt to model the method of generating a fact from the opinions of other persons or of institutions as a process which is based on knowledge about these...
Martin Thost