Sciweavers

7378 search results - page 1372 / 1476
» Introduction to Machine Learning
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 9 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
IJON
2007
80views more  IJON 2007»
14 years 9 months ago
Hardware implementation of a novel genetic algorithm
—This paper presents a novel genetic algorithm, termed the Optimum Individual Monogenetic Algorithm (OIMGA) and describes its hardware implementation. As the monogenetic strategy...
Z. Zhu, D. J. Mulvaney, Vassilios A. Chouliaras
TASLP
2008
158views more  TASLP 2008»
14 years 9 months ago
Score-Independent Audio Features for Description of Music Expression
Abstract--During a music performance, the musician adds expressiveness to the musical message by changing timing, dynamics, and timbre of the musical events to communicate an expre...
Luca Mion, Giovanni De Poli
INFORMS
2007
123views more  INFORMS 2007»
14 years 9 months ago
Constructing Ensembles from Data Envelopment Analysis
It has been shown in prior work in management science, statistics and machine learning that using an ensemble of models often results in better performance than using a single ‘...
Zhiqiang Zheng, Balaji Padmanabhan
TCS
2008
14 years 9 months ago
Algorithms for subsequence combinatorics
A subsequence is obtained from a string by deleting any number of characters; thus in contrast to a substring, a subsequence is not necessarily a contiguous part of the string. Co...
Cees H. Elzinga, Sven Rahmann, Hui Wang
« Prev « First page 1372 / 1476 Last » Next »