Sciweavers

1824 search results - page 226 / 365
» Pose Classification Using Support Vector Machines
Sort
View
112
Voted
COLT
2005
Springer
15 years 8 months ago
Ranking and Scoring Using Empirical Risk Minimization
A general model is proposed for studying ranking problems. We investigate learning methods based on empirical minimization of the natural estimates of the ranking risk. The empiric...
Stéphan Clémençon, Gáb...
156
Voted
JNCA
2007
179views more  JNCA 2007»
15 years 2 months ago
Modeling intrusion detection system using hybrid intelligent systems
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Sandhya Peddabachigari, Ajith Abraham, Crina Grosa...
133
Voted
CORR
2006
Springer
130views Education» more  CORR 2006»
15 years 2 months ago
Genetic Programming for Kernel-based Learning with Co-evolving Subsets Selection
Abstract. Support Vector Machines (SVMs) are well-established Machine Learning (ML) algorithms. They rely on the fact that i) linear learning can be formalized as a well-posed opti...
Christian Gagné, Marc Schoenauer, Mich&egra...
113
Voted
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 8 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
128
Voted
AINA
2004
IEEE
15 years 6 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen