Sciweavers

531 search results - page 78 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
PERVASIVE
2009
Springer
15 years 8 months ago
Methodologies for Continuous Cellular Tower Data Analysis
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Nathan Eagle, John A. Quinn, Aaron Clauset
142
Voted
KESAMSTA
2009
Springer
15 years 6 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
NAACL
2004
15 years 2 months ago
Multiple Similarity Measures and Source-Pair Information in Story Link Detection
State-of-the-art story link detection systems, that is, systems that determine whether two stories are about the same event or linked, are usually based on the cosine-similarity m...
Francine Chen, Ayman Farahat, Thorsten Brants
ICMI
2009
Springer
150views Biometrics» more  ICMI 2009»
15 years 8 months ago
Agreement detection in multiparty conversation
This paper presents a system for the automatic detection of agreements in multi-party conversations. We investigate various types of features that are useful for identifying agree...
Sebastian Germesin, Theresa Wilson
HAIS
2011
Springer
14 years 5 months ago
Clustering Ensemble for Spam Filtering
One of the main problems that modern e-mail systems face is the management of the high degree of spam or junk mail they recieve. Those systems are expected to be able to distinguis...
Santiago Porras, Bruno Baruque, Belén Vaque...