Sciweavers

116 search results - page 17 / 24
» Evaluation of decision trees: a multi-criteria approach
Sort
View
ACSAC
2003
IEEE
15 years 4 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
94
Voted
INFOCOM
2011
IEEE
14 years 2 months ago
Forwarding anomalies in Bloom filter-based multicast
Abstract—Several recently proposed multicast protocols use inpacket Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-fl...
Mikko Särelä, Christian Esteve Rothenber...
116
Voted
ICRA
2005
IEEE
138views Robotics» more  ICRA 2005»
15 years 4 months ago
Urban Object Recognition from Informative Local Features
Abstract— Autonomous mobile agents require object recognition for high level interpretation and localization in complex scenes. In urban environments, recognition of buildings mi...
Gerald Fritz, Christin Seifert, Lucas Paletta
82
Voted
KDD
2003
ACM
149views Data Mining» more  KDD 2003»
15 years 11 months ago
Knowledge-based data mining
We describe techniques for combining two types of knowledge systems: expert and machine learning. Both the expert system and the learning system represent information by logical d...
Søren Damgaard, Sholom M. Weiss, Shubir Kap...
JSA
2006
97views more  JSA 2006»
14 years 11 months ago
Dynamic feature selection for hardware prediction
It is often possible to greatly improve the performance of a hardware system via the use of predictive (speculative) techniques. For example, the performance of out-of-order micro...
Alan Fern, Robert Givan, Babak Falsafi, T. N. Vija...