We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
We consider prediction-model evaluation in the context of marketing-campaign planning. In order to evaluate and compare models with specific campaign objectives in mind, we need t...
Saharon Rosset, Einat Neumann, Uri Eick, Nurit Vat...
—We present an image retrieval system based on a combined search of text and content. The idea is to use the text present in title, description, and tags of the images for improv...
Juan Manuel Barrios, Diego Diaz-Espinoza, Benjamin...
Structured prediction has become very important in recent years. A simple but notable class of structured prediction is one for sequences, so-called sequential labeling. For sequen...
A new clustering strategy is proposed based on interval sets, which is an alternative formulation different from the ones used in the existing studies. Instead of using a single s...