Sciweavers

718 search results - page 64 / 144
» From decision theory to decision aiding methodology
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
AUSAI
2008
Springer
14 years 11 months ago
CASPER: A Case-Based Poker-Bot
This paper investigates the use of the case-based reasoning methodology applied to the game of Texas hold'em poker. The development of a CASe-based Poker playER (CASPER) is de...
Ian Watson, Jonathan Rubin
ISTA
2007
14 years 11 months ago
Return on Security Investments - Design Principles of Measurement Systems Based on Capital Budgeting
: IT-security has become a vital factor in electronic commerce nowadays. Thus, investments have to be made in order to safeguard security. However, the benefits of these investment...
Jan vom Brocke, Gereon Strauch, Christian Buddendi...
MP
2006
110views more  MP 2006»
14 years 9 months ago
Extending Scope of Robust Optimization: Comprehensive Robust Counterparts of Uncertain Problems
In this paper, we propose a new methodology for handling optimization problems with uncertain data. With the usual Robust Optimization paradigm, one looks for the decisions ensurin...
Aharon Ben-Tal, Stephen Boyd, Arkadi Nemirovski
NLE
2010
218views more  NLE 2010»
14 years 8 months ago
Automatic discovery of word semantic relations using paraphrase alignment and distributional lexical semantics analysis
Thesauri, that list the most salient semantic relations between words have mostly been compiled manually. Therefore, the inclusion of an entry depends on the subjective decision o...
Gaël Dias, Rumen Moraliyski, João Cord...