Sciweavers

531 search results - page 91 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
15 years 5 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
MLMI
2005
Springer
15 years 5 months ago
Automatic Speech Recognition and Speech Activity Detection in the CHIL Smart Room
Abstract. An important step to bring speech technologies into wide deployment as a functional component in man-machine interfaces is to free the users from close-talk or desktop mi...
Stephen M. Chu, Etienne Marcheret, Gerasimos Potam...
FAST
2010
15 years 2 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
CORR
2004
Springer
195views Education» more  CORR 2004»
14 years 11 months ago
Detecting User Engagement in Everyday Conversations
This paper presents a novel application of speech emotion recognition: estimation of the level of conversational engagement between users of a voice communication system. We begin...
Chen Yu, Paul M. Aoki, Allison Woodruff
JCM
2006
179views more  JCM 2006»
14 years 11 months ago
Collaborative Allocation of Orthogonal Frequency Division Multiplex Sub-Carriers using the Swarm Intelligence
Abstract-- Future generations of wireless systems require opportunistic spectrum access techniques to effectively detect and access temporarily unused spectrum bands. Cognitive rad...
J. C. Dunat, David Grandblaise, Christian Bonnet