Sciweavers

345 search results - page 59 / 69
» Using Active Learning in Intrusion Detection
Sort
View
ACL
2011
14 years 2 months ago
Jointly Learning to Extract and Compress
We learn a joint model of sentence extraction and compression for multi-document summarization. Our model scores candidate summaries according to a combined linear model whose fea...
Taylor Berg-Kirkpatrick, Dan Gillick, Dan Klein
JIPS
2007
223views more  JIPS 2007»
14 years 10 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 11 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
EUSAI
2007
Springer
15 years 4 months ago
Context-Sensitive Microlearning of Foreign Language Vocabulary on a Mobile Device
Abstract. We explore the use of ubiquitous sensing in the home for contextsensitive microlearning. To assess how users would respond to frequent and brief learning interactions tie...
Jennifer Beaudin, Stephen S. Intille, Emmanuel Mun...
CVPR
2005
IEEE
16 years 16 days ago
Space-Time Behavior Based Correlation
We introduce a behavior-based similarity measure which tells us whether two different space-time intensity patterns of two different video segments could have resulted from a simi...
Eli Shechtman, Michal Irani