Sciweavers

394 search results - page 70 / 79
» Learning to recommend questions based on user ratings
Sort
View
FLAIRS
2008
15 years 2 days ago
A Backward Adjusting Strategy and Optimization of the C4.5 Parameters to Improve C4.5's Performance
In machine learning, decision trees are employed extensively in solving classification problems. In order to design a decision tree classifier two main phases are employed. The fi...
Jason R. Beck, Maria Garcia, Mingyu Zhong, Michael...
CIKM
2009
Springer
15 years 4 months ago
Semi-nonnegative matrix factorization with global statistical consistency for collaborative filtering
Collaborative Filtering, considered by many researchers as the most important technique for information filtering, has been extensively studied by both academic and industrial co...
Hao Ma, Haixuan Yang, Irwin King, Michael R. Lyu
SIGMETRICS
2004
ACM
108views Hardware» more  SIGMETRICS 2004»
15 years 3 months ago
Uncooperative congestion control
—Traditionally uncooperative rate control schemes have implied open loop protocols such as UDP, CBR. In this paper we show that closed loop uncooperative rate control schemes als...
Kartikeya Chandrayana, Shivkumar Kalyanaraman
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 10 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
15 years 10 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan