Sciweavers

531 search results - page 73 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
IEEEARES
2009
IEEE
15 years 8 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
PAMI
2008
161views more  PAMI 2008»
15 years 1 months ago
TRUST-TECH-Based Expectation Maximization for Learning Finite Mixture Models
The Expectation Maximization (EM) algorithm is widely used for learning finite mixture models despite its greedy nature. Most popular model-based clustering techniques might yield...
Chandan K. Reddy, Hsiao-Dong Chiang, Bala Rajaratn...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 8 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
107
Voted
SBRN
2000
IEEE
15 years 5 months ago
An Evolutionary Immune Network for Data Clustering
This paper explores basic aspects of the immune system and proposes a novel immune network model with the main goals of clustering and filtering unlabeled numerical data sets. It ...
Leandro Nunes de Castro, Fernando J. Von Zuben
AGENTS
2000
Springer
15 years 5 months ago
BoB: an interactive improvisational music companion
This paper introduces a new domain for believable agents (BA) and presents novel methods for dealing with the unique challenges that arise therein. The domain is providing improvi...
Belinda Thom