Sciweavers

809 search results - page 53 / 162
» Experiments with Cost-Sensitive Feature Evaluation
Sort
View
ENVSOFT
2007
78views more  ENVSOFT 2007»
15 years 21 days ago
CREDOS: A Conservation Reserve Evaluation And Design Optimisation System
A number of spatial decision support systems (SDSSs) are already available for the systematic planning of conservation reserves. These existing systems offer varying levels of int...
Neville D. Crossman, Lyall M. Perry, Brett A. Brya...
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
15 years 6 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
CSDA
2008
147views more  CSDA 2008»
15 years 24 days ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
108
Voted
ICANN
2007
Springer
15 years 4 months ago
Active Learning to Support the Generation of Meta-examples
Meta-Learning has been used to select algorithms based on the features of the problems being tackled. Each training example in this context, i.e. each meta-example, stores the feat...
Ricardo Bastos Cavalcante Prudêncio, Teresa ...
ICB
2007
Springer
185views Biometrics» more  ICB 2007»
15 years 6 months ago
Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures
We present a general biometric hash generation scheme based on vector quantization of multiple feature subsets selected with genetic optimization. The quantization of subsets overc...
Manuel R. Freire, Julian Fiérrez-Aguilar, J...