Sciweavers

776 search results - page 54 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
15 years 9 months ago
Initialization parameter sweep in ATHENA: optimizing neural networks for detecting gene-gene interactions in the presence of sma
Recent advances in genotyping technology have led to the generation of an enormous quantity of genetic data. Traditional methods of statistical analysis have proved insufficient i...
Emily Rose Holzinger, Carrie C. Buchanan, Scott M....
ICMLA
2009
15 years 1 months ago
Application of Artificial Neural Network (ANN) Method to Exergy Analysis of Thermodynamic Systems
Exergy is a way to sustainable development and may be defined as the maximum theoretical useful work, while exergy analysis identifies the sources, the magnitude and the causes of...
Yilmaz Yoru, T. Hikmet Karakoc, Arif Hepbasli
ACSAC
2001
IEEE
15 years 7 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
JPDC
2006
129views more  JPDC 2006»
15 years 4 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
ISNN
2007
Springer
15 years 10 months ago
A Hierarchical Self-organizing Associative Memory for Machine Learning
This paper proposes novel hierarchical self-organizing associative memory architecture for machine learning. This memory architecture is characterized with sparse and local interco...
Janusz A. Starzyk, Haibo He, Yue Li