Sciweavers

1227 search results - page 156 / 246
» Learning Rates for Q-Learning
Sort
View
RECSYS
2009
ACM
15 years 4 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
IEEEPACT
2005
IEEE
15 years 3 months ago
A Simple Divide-and-Conquer Approach for Neural-Class Branch Prediction
The continual demand for greater performance and growing concerns about the power consumption in highperformance microprocessors make the branch predictor a critical component of ...
Gabriel H. Loh
ISMIS
2005
Springer
15 years 3 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
MLMI
2005
Springer
15 years 3 months ago
The Rich Transcription 2005 Spring Meeting Recognition Evaluation
This paper presents the design and results of the Rich Transcription Spring 2005 (RT-05S) Meeting Recognition Evaluation. This evaluation is the third in a series of community-wide...
Jonathan G. Fiscus, Nicolas Radde, John S. Garofol...