Sciweavers

968 search results - page 97 / 194
» Evaluating Benchmark Subsetting Approaches
Sort
View
ISI
2007
Springer
15 years 1 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
PAMI
1998
134views more  PAMI 1998»
15 years 1 months ago
A Bayesian Framework for Deformable Pattern Recognition With Application to Handwritten Character Recognition
—Deformable models have recently been proposed for many pattern recognition applications due to their ability to handle large shape variations.These proposed approaches represent...
Kwok-Wai Cheung, Dit-Yan Yeung, Roland T. Chin
SP
2002
IEEE
15 years 1 months ago
Stateful Intrusion Detection for High-Speed Networks
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Christopher Krügel, Fredrik Valeur, Giovanni ...
PVLDB
2010
120views more  PVLDB 2010»
14 years 12 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab
ISDA
2010
IEEE
14 years 11 months ago
Comparing SVM ensembles for imbalanced datasets
Real life datasets often suffer from the problem of class imbalance, which thwarts supervised learning process. In such data sets examples of positive (minority) class are signific...
Vasudha Bhatnagar, Manju Bhardwaj, Ashish Mahabal