Sciweavers

612 search results - page 113 / 123
» Using Data Compressors to Construct Rank Tests
Sort
View
ISMIS
2005
Springer
15 years 3 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 3 months ago
Applying the Task-Technology Fit Model to WWW-based Procurement: Conceptualization and Measurement
This research examines the application of the tasktechnology fit (TTF) model to World Wide Web (WWW) usage for electronic commerce (EC) purposes. Conducted from corporate buyersâ€...
Younes Benslimane, Michel Plaisent, Prosper Bernar...
GECCO
2003
Springer
110views Optimization» more  GECCO 2003»
15 years 3 months ago
Evolutionary Multiobjective Optimization for Generating an Ensemble of Fuzzy Rule-Based Classifiers
One advantage of evolutionary multiobjective optimization (EMO) algorithms over classical approaches is that many non-dominated solutions can be simultaneously obtained by their si...
Hisao Ishibuchi, Takashi Yamamoto
CLEF
2009
Springer
14 years 11 months ago
A Trainable Multi-factored QA System
This paper reports on the construction and testing of a new Question Answering (QA) system, implemented as an workflow which builds on several web services developed at the Resear...
Radu Ion, Dan Stefanescu, Alexandru Ceausu, Dan Tu...
JAR
2006
99views more  JAR 2006»
14 years 10 months ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...