Sciweavers

2015 search results - page 64 / 403
» Hidden Software Capabilities
Sort
View
ETRICS
2006
15 years 4 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
108
Voted
ESANN
2003
15 years 1 months ago
Approximation of Function by Adaptively Growing Radial Basis Function Neural Networks
In this paper a neural network for approximating function is described. The activation functions of the hidden nodes are the Radial Basis Functions (RBF) whose parameters are learn...
Jianyu Li, Siwei Luo, Yingjian Qi
69
Voted
NIPS
2001
15 years 1 months ago
Generalizable Relational Binding from Coarse-coded Distributed Representations
We present a model of binding of relationship information in a spatial domain (e.g., square above triangle) that uses low-order coarse-coded conjunctive representations instead of...
Randall C. O'Reilly, R. S. Busby
98
Voted
PR
2008
145views more  PR 2008»
15 years 15 days ago
Gesture spotting with body-worn inertial sensors to detect user activities
We present a method for spotting sporadically occurring gestures in a continuous data stream from body-worn inertial sensors. Our method is based on a natural partitioning of cont...
Holger Junker, Oliver Amft, Paul Lukowicz, Gerhard...
105
Voted
DATAMINE
1998
126views more  DATAMINE 1998»
15 years 7 days ago
An Extension to SQL for Mining Association Rules
Data mining evolved as a collection of applicative problems and efficient solution algorithms relative to rather peculiar problems, all focused on the discovery of relevant infor...
Rosa Meo, Giuseppe Psaila, Stefano Ceri