Sciweavers

776 search results - page 75 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
CVPR
2004
IEEE
16 years 6 months ago
Learning Methods for Generic Object Recognition with Invariance to Pose and Lighting
We assess the applicability of several popular learning methods for the problem of recognizing generic visual categories with invariance to pose, lighting, and surrounding clutter...
Fu Jie Huang, Léon Bottou, Yann LeCun
ICANN
2009
Springer
15 years 11 months ago
Using Kernel Basis with Relevance Vector Machine for Feature Selection
This paper presents an application of multiple kernels like Kernel Basis to the Relevance Vector Machine algorithm. The framework of kernel machines has been a source of many works...
Frederic Suard, David Mercier
RAID
2007
Springer
15 years 10 months ago
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
CORR
2008
Springer
159views Education» more  CORR 2008»
15 years 4 months ago
Face Detection Using Adaboosted SVM-Based Component Classifier
: Boosting is a general method for improving the accuracy of any given learning algorithm. In this paper we employ combination of Adaboost with Support Vector Machine (SVM) as comp...
Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan,...
ECTEL
2006
Springer
15 years 8 months ago
New Media for Teaching Applied Cryptography and Network Security
Considering that security education needs to train students to deal with security problems in real environments, we developed new media for teaching applied cryptography and networ...
Ji Hu, Dirk Cordel, Christoph Meinel