Sciweavers

7351 search results - page 144 / 1471
» Machine Learning
Sort
View
WFLP
2000
Springer
148views Algorithms» more  WFLP 2000»
15 years 1 months ago
The Use of Functional and Logic Languages in Machine Learning
Abstract. Traditionally, machine learning algorithms such as decision tree learners have employed attribute-value representations. From the early 80's on people have started t...
Peter A. Flach
ICAC
2006
IEEE
15 years 4 months ago
Fast and Effective Worm Fingerprinting via Machine Learning
— As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply mac...
Stewart M. Yang, Jianping Song, Harish Rajamani, T...
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
LFCS
1992
Springer
15 years 2 months ago
Machine Learning of Higher Order Programs
A generator program for a computable function (by definition) generates an infinite sequence of programs all but finitely many of which compute that function. Machine learning of ...
Ganesh Baliga, John Case, Sanjay Jain, Mandayam Su...
ICML
2007
IEEE
15 years 10 months ago
An empirical evaluation of deep architectures on problems with many factors of variation
Recently, several learning algorithms relying on models with deep architectures have been proposed. Though they have demonstrated impressive performance, to date, they have only b...
Hugo Larochelle, Dumitru Erhan, Aaron C. Courville...