Sciweavers

765 search results - page 124 / 153
» Detecting Anomalies and Intruders
Sort
View
KDD
2010
ACM
161views Data Mining» more  KDD 2010»
14 years 11 months ago
Mass estimation and its applications
This paper introduces mass estimation—a base modelling mechanism in data mining. It provides the theoretical basis of mass and an efficient method to estimate mass. We show that...
Kai Ming Ting, Guang-Tong Zhou, Fei Tony Liu, Jame...
COMMA
2008
14 years 11 months ago
A Level-based Approach to Computing Warranted Arguments in Possibilistic Defeasible Logic Programming
Abstract. Possibilistic Defeasible Logic Programming (P-DeLP) is an argumentation framework based on logic programming which incorporates a treatment of possibilistic uncertainty a...
Teresa Alsinet, Carlos Iván Chesñeva...
NIPS
2008
14 years 11 months ago
Empirical performance maximization for linear rank statistics
The ROC curve is known to be the golden standard for measuring performance of a test/scoring statistic regarding its capacity of discrimination between two populations in a wide v...
Stéphan Clémençon, Nicolas Va...
FLAIRS
2003
14 years 11 months ago
Automated Data Fusion and Situation Assessment in Space Systems
Spacecraft are key components of military operations and everyday life. To achieve space situation awareness, human operators must monitor large numbers of parameters. During off-...
Mark L. Hanson, Paul G. Gonsalves
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
14 years 10 months ago
Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions
Affinity functions are the core components in negative selection to discriminate self from non-self. It has been shown that affinity functions such as the r-contiguous distance an...
Thomas Stibor