Sciweavers

164 search results - page 18 / 33
» Selecting and Improving System Call Models for Anomaly Detec...
Sort
View
CEC
2010
IEEE
14 years 10 months ago
Functionalization of microarray devices: Process optimization using a multiobjective PSO and multiresponse MARS modeling
An evolutionary approach for the optimization of microarray coatings produced via sol-gel chemistry is presented. The aim of the methodology is to face the challenging aspects of t...
Laura Villanova, Paolo Falcaro, Davide Carta, Iren...
ASIAMS
2008
IEEE
15 years 3 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 10 days ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
CSL
2006
Springer
14 years 9 months ago
A study in machine learning from imbalanced data for sentence boundary detection in speech
Enriching speech recognition output with sentence boundaries improves its human readability and enables further processing by downstream language processing modules. We have const...
Yang Liu, Nitesh V. Chawla, Mary P. Harper, Elizab...
92
Voted
USS
2010
14 years 7 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...