Sciweavers

1325 search results - page 219 / 265
» Algorithm Selection using Reinforcement Learning
Sort
View
CSDA
2008
147views more  CSDA 2008»
13 years 11 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
ICML
2008
IEEE
14 years 11 months ago
On the quantitative analysis of deep belief networks
Deep Belief Networks (DBN's) are generative models that contain many layers of hidden variables. Efficient greedy algorithms for learning and approximate inference have allow...
Ruslan Salakhutdinov, Iain Murray
CIKM
2011
Springer
12 years 11 months ago
Toward interactive training and evaluation
Machine learning often relies on costly labeled data, and this impedes its application to new classification and information extraction problems. This has motivated the developme...
Gregory Druck, Andrew McCallum
KDD
2008
ACM
206views Data Mining» more  KDD 2008»
14 years 11 months ago
Identifying biologically relevant genes via multiple heterogeneous data sources
Selection of genes that are differentially expressed and critical to a particular biological process has been a major challenge in post-array analysis. Recent development in bioin...
Zheng Zhao, Jiangxin Wang, Huan Liu, Jieping Ye, Y...
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 3 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok