Sciweavers

120 search results - page 11 / 24
» Robust Representation for Domain Adaptation in Network Secur...
Sort
View
ISI
2005
Springer
15 years 3 months ago
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
Experiments were conducted to test several hypotheses on methods for improving document classification for the malicious insider threat problem within the Intelligence Community. ...
Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balas...
IJRR
2008
186views more  IJRR 2008»
14 years 10 months ago
Automated Design of Adaptive Controllers for Modular Robots using Reinforcement Learning
Designing distributed controllers for self-reconfiguring modular robots has been consistently challenging. We have developed a reinforcement learning approach which can be used bo...
Paulina Varshavskaya, Leslie Pack Kaelbling, Danie...
AIA
2007
14 years 11 months ago
Adaptive preference elicitation for top-K recommendation tasks using GAI-networks
The enormous number of questions needed to acquire a full preference model when the size of the outcome space is large forces us to work with partial models that approximate the u...
Sérgio R. de M. Queiroz
DASC
2006
IEEE
15 years 4 months ago
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services
Abstract— This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication perform...
Philip K. McKinley, Farshad A. Samimi, Jonathan K....
CORR
2010
Springer
123views Education» more  CORR 2010»
14 years 10 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin