Sciweavers

497 search results - page 55 / 100
» Netlearning and Learning through Networks
Sort
View
JAIR
2010
181views more  JAIR 2010»
14 years 8 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
16 years 2 months ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon
NIPS
1989
15 years 3 months ago
The Cascade-Correlation Learning Architecture
Cascade-Correlation is a new architecture and supervised learning algorithm for artificial neural networks. Instead of just adjusting the weights in a network of fixed topology,...
Scott E. Fahlman, Christian Lebiere
KDD
2007
ACM
139views Data Mining» more  KDD 2007»
16 years 2 months ago
Looking for Great Ideas: Analyzing the Innovation Jam
We discuss the Innovation Jam that IBM carried out in 2006, with the objective of identifying innovative and promising "Big Ideas" through a moderated on-line discussion...
Wojciech Gryc, Mary E. Helander, Richard D. Lawren...
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
15 years 8 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko