Sciweavers

1436 search results - page 243 / 288
» Using Machine Learning Techniques to Interpret WH-questions
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 1 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
BLISS
2007
IEEE
15 years 7 months ago
Evolving the Face of a Criminal: How to Search a Face Space More Effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark ...
COLT
2004
Springer
15 years 6 months ago
Performance Guarantees for Regularized Maximum Entropy Density Estimation
Abstract. We consider the problem of estimating an unknown probability distribution from samples using the principle of maximum entropy (maxent). To alleviate overfitting with a v...
Miroslav Dudík, Steven J. Phillips, Robert ...
WWW
2009
ACM
16 years 2 months ago
Web image retrieval reranking with multi-view clustering
General image retrieval is often carried out by a text-based search engine, such as Google Image Search. In this case, natural language queries are used as input to the search eng...
Mingmin Chi, Peiwu Zhang, Yingbin Zhao, Rui Feng, ...
EUROSYS
2006
ACM
15 years 10 months ago
Automated known problem diagnosis with event traces
Computer problem diagnosis remains a serious challenge to users and support professionals. Traditional troubleshooting methods relying heavily on human intervention make the proce...
Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zh...