Sciweavers

396 search results - page 62 / 80
» Evaluating high accuracy retrieval techniques
Sort
View
67
Voted
INFOCOM
2007
IEEE
15 years 4 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
15 years 3 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
75
Voted
IMC
2004
ACM
15 years 3 months ago
MultiQ: automated detection of multiple bottleneck capacities along a path
multiQ is a passive capacity measurement tool suitable for largescale studies of Internet path characteristics. It is the first passive tool that discovers the capacity of multip...
Sachin Katti, Dina Katabi, Charles Blake, Eddie Ko...
77
Voted
SEKE
2004
Springer
15 years 3 months ago
Supporting the Requirements Prioritization Process. A Machine Learning approach
Requirements prioritization plays a key role in the requirements engineering process, in particular with respect to critical tasks such as requirements negotiation and software re...
Paolo Avesani, Cinzia Bazzanella, Anna Perini, Ang...
SIGIR
2003
ACM
15 years 2 months ago
A maximal figure-of-merit learning approach to text categorization
A novel maximal figure-of-merit (MFoM) learning approach to text categorization is proposed. Different from the conventional techniques, the proposed MFoM method attempts to integ...
Sheng Gao, Wen Wu, Chin-Hui Lee, Tat-Seng Chua