Sciweavers

8381 search results - page 1574 / 1677
» The security of machine learning
Sort
View
117
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 7 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
141
Voted
JSAC
2010
146views more  JSAC 2010»
14 years 7 months ago
NLOS identification and mitigation for localization based on UWB experimental data
Abstract--Sensor networks can benefit greatly from locationawareness, since it allows information gathered by the sensors to be tied to their physical locations. Ultra-wide bandwid...
Stefano Maranò, Wesley M. Gifford, Henk Wym...
SAC
2010
ACM
14 years 7 months ago
A study on interestingness measures for associative classifiers
Associative classification is a rule-based approach to classify data relying on association rule mining by discovering associations between a set of features and a class label. Su...
Mojdeh Jalali Heravi, Osmar R. Zaïane
163
Voted
SEMWEB
2010
Springer
14 years 7 months ago
A reasonable Semantic Web
Abstract. The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenge...
Pascal Hitzler, Frank van Harmelen
SIGKDD
2010
151views more  SIGKDD 2010»
14 years 7 months ago
Limitations of matrix completion via trace norm minimization
In recent years, compressive sensing attracts intensive attentions in the field of statistics, automatic control, data mining and machine learning. It assumes the sparsity of the ...
Xiaoxiao Shi, Philip S. Yu
« Prev « First page 1574 / 1677 Last » Next »