Sciweavers

531 search results - page 54 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
ICONIP
2004
15 years 2 months ago
Collaborative Agent Learning Using Neurocomputing
In this paper we investigate techniques to train an agent to accomplish certain tasks. Artificial Neural Networks will be the technique used to the train the agent. This paper will...
Saulat Farooque, Ajith Abraham, Lakhmi C. Jain
126
Voted
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
15 years 5 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
ICDM
2002
IEEE
138views Data Mining» more  ICDM 2002»
15 years 6 months ago
Extraction Techniques for Mining Services from Web Sources
The Web has established itself as the dominant medium for doing electronic commerce. Consequently the number of service providers, both large and small, advertising their services...
Hasan Davulcu, Saikat Mukherjee, I. V. Ramakrishna...
AAAI
2012
13 years 3 months ago
A Novel and Scalable Spatio-Temporal Technique for Ocean Eddy Monitoring
Swirls of ocean currents known as ocean eddies are a crucial component of the ocean’s dynamics. In addition to dominating the ocean’s kinetic energy, eddies play a significan...
James H. Faghmous, Yashu Chamber, Shyam Boriah, Fr...
CORR
2004
Springer
140views Education» more  CORR 2004»
15 years 1 months ago
Integrating Defeasible Argumentation and Machine Learning Techniques
The field of machine learning (ML) is concerned with the question of how to construct algorithms that automatically improve with experience. In recent years many successful ML app...
Sergio Alejandro Gómez, Carlos Iván ...