Sciweavers

888 search results - page 140 / 178
» Improving Random Projections Using Marginal Information
Sort
View
ICASSP
2008
IEEE
15 years 6 months ago
A GIS-like training algorithm for log-linear models with hidden variables
Conditional Random Fields (CRFs) are often estimated using an entropy based criterion in combination with Generalized Iterative Scaling (GIS). GIS offers, upon others, the immedi...
Georg Heigold, Thomas Deselaers, Ralf Schlüte...
IEEEIAS
2008
IEEE
15 years 6 months ago
Ensemble of One-Class Classifiers for Network Intrusion Detection System
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensembl...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
INEX
2009
Springer
15 years 4 months ago
Overview of the INEX 2009 Link the Wiki Track
In the third year of the Link the Wiki track, the focus has been shifted to anchor-to-bep link discovery. The participants were encouraged to utilize different technologies to reso...
Darren Wei Che Huang, Shlomo Geva, Andrew Trotman
CORR
2010
Springer
88views Education» more  CORR 2010»
14 years 12 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
16 years 6 days ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor