Sciweavers

3949 search results - page 239 / 790
» Machine Learning and Data Mining
Sort
View
151
Voted
ICEIS
2008
IEEE
15 years 10 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
110
Voted
GECCO
2006
Springer
173views Optimization» more  GECCO 2006»
15 years 7 months ago
Sets of receiver operating characteristic curves and their use in the evaluation of multi-class classification
Within the last two decades, Receiver Operating Characteristic (ROC) Curves have become a standard tool for the analysis and comparison of classifiers since they provide a conveni...
Stephan M. Winkler, Michael Affenzeller, Stefan Wa...
132
Voted
ICML
2000
IEEE
16 years 4 months ago
Meta-Learning by Landmarking Various Learning Algorithms
Landmarking is a novel approach to describing tasks in meta-learning. Previous approaches to meta-learning mostly considered only statistics-inspired measures of the data as a sou...
Bernhard Pfahringer, Hilan Bensusan, Christophe G....
131
Voted
ML
2008
ACM
15 years 3 months ago
Inductive process modeling
In this paper, we pose a novel research problem for machine learning that involves constructing a process model from continuous data. We claim that casting learned knowledge in ter...
Will Bridewell, Pat Langley, Ljupco Todorovski, Sa...
141
Voted
ICML
2007
IEEE
16 years 4 months ago
Beamforming using the relevance vector machine
Beamformers are spatial filters that pass source signals in particular focused locations while suppressing interference from elsewhere. The widely-used minimum variance adaptive b...
David P. Wipf, Srikantan S. Nagarajan