Sciweavers

531 search results - page 91 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
15 years 7 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
MLMI
2005
Springer
15 years 7 months ago
Automatic Speech Recognition and Speech Activity Detection in the CHIL Smart Room
Abstract. An important step to bring speech technologies into wide deployment as a functional component in man-machine interfaces is to free the users from close-talk or desktop mi...
Stephen M. Chu, Etienne Marcheret, Gerasimos Potam...
FAST
2010
15 years 3 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
CORR
2004
Springer
195views Education» more  CORR 2004»
15 years 1 months ago
Detecting User Engagement in Everyday Conversations
This paper presents a novel application of speech emotion recognition: estimation of the level of conversational engagement between users of a voice communication system. We begin...
Chen Yu, Paul M. Aoki, Allison Woodruff
JCM
2006
179views more  JCM 2006»
15 years 1 months ago
Collaborative Allocation of Orthogonal Frequency Division Multiplex Sub-Carriers using the Swarm Intelligence
Abstract-- Future generations of wireless systems require opportunistic spectrum access techniques to effectively detect and access temporarily unused spectrum bands. Cognitive rad...
J. C. Dunat, David Grandblaise, Christian Bonnet