Sciweavers

1736 search results - page 193 / 348
» String Extension Learning
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 6 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
SDM
2010
SIAM
200views Data Mining» more  SDM 2010»
15 years 3 months ago
Residual Bayesian Co-clustering for Matrix Approximation
In recent years, matrix approximation for missing value prediction has emerged as an important problem in a variety of domains such as recommendation systems, e-commerce and onlin...
Hanhuai Shan, Arindam Banerjee
109
Voted
AAAI
1994
15 years 3 months ago
Recovering Software Specifications with Inductive Logic Programming
We consider using machine learning techniques to help understand a large software system. In particular, we describe how learning techniques can be used to reconstruct abstract Da...
William W. Cohen
CORR
2007
Springer
172views Education» more  CORR 2007»
15 years 1 months ago
A Data-Parallel Version of Aleph
This is to present work on modifying the Aleph ILP system so that it evaluates the hypothesised clauses in parallel by distributing the data-set among the nodes of a parallel or di...
Stasinos Konstantopoulos
IJRR
2010
137views more  IJRR 2010»
15 years 11 days ago
Multiclass Multimodal Detection and Tracking in Urban Environments
This paper presents a novel approach to detect and track pedestrians and cars based on the combined information retrieved from a camera and a laser range scanner. Laser data points...
Luciano Spinello, Rudolph Triebel, Roland Siegwart