Sciweavers

1486 search results - page 59 / 298
» Firewall Rules Analysis
Sort
View
EUROSEC
2010
ACM
15 years 5 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
BIOSTEC
2008
162views Healthcare» more  BIOSTEC 2008»
15 years 1 months ago
On Extraction of Nutritional Patterns (NPS) Using Fuzzy Association Rule Mining
This paper proposes a framework for mining market basket data to generate Nutritional Patterns (NPs) and a method for analysing generated nutritional patterns using F...
M. Sulaiman Khan, Maybin K. Muyeba, Frans Coenen
SSPR
2000
Springer
15 years 3 months ago
The Role of Combining Rules in Bagging and Boosting
To improve weak classifiers bagging and boosting could be used. These techniques are based on combining classifiers. Usually, a simple majority vote or a weighted majority vote are...
Marina Skurichina, Robert P. W. Duin
JC
2006
115views more  JC 2006»
14 years 11 months ago
Randomly shifted lattice rules on the unit cube for unbounded integrands in high dimensions
We study the problem of multivariate integration on the unit cube for unbounded integrands. Our study is motivated by problems in statistics and mathematical finance, where unboun...
Benjamin J. Waterhouse, Frances Y. Kuo, Ian H. Slo...
CDC
2010
IEEE
164views Control Systems» more  CDC 2010»
14 years 6 months ago
Accuracy and decision time for a class of sequential decision aggregation rules
Abstract-- This work focuses on decentralized decision making in a population of individuals each implementing the sequential probability ratio test. The individual decisions are c...
Sandra H. Dandach, Ruggero Carli, Francesco Bullo