Sciweavers

24680 search results - page 4433 / 4936
» Learning
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 4 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
68views Education» more  CORR 2010»
15 years 4 months ago
Is It Real, or Is It Randomized?: A Financial Turing Test
We construct a financial "Turing test" to determine whether human subjects can differentiate between actual vs. randomized financial returns. The experiment consists of ...
Jasmina Hasanhodzic, Andrew W. Lo, Emanuele Viola
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 4 months ago
Mimicking the Behaviour of Idiotypic AIS Robot Controllers Using Probabilistic Systems
Previous work has shown that robot navigation systems that employ an architecture based upon the idiotypic network theory of the immune system have an advantage over control techn...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 4 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CORR
2010
Springer
119views Education» more  CORR 2010»
15 years 4 months ago
Dynamic Policy Programming
In this paper, we consider the problem of planning and learning in the infinite-horizon discounted-reward Markov decision problems. We propose a novel iterative direct policysearc...
Mohammad Gheshlaghi Azar, Hilbert J. Kappen
« Prev « First page 4433 / 4936 Last » Next »