Sciweavers

776 search results - page 83 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 9 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
HSNMC
2004
Springer
106views Multimedia» more  HSNMC 2004»
15 years 9 months ago
Performance Evaluation of a Probabilistic Packet Filter Optimization Algorithm for High-Speed Network Monitoring
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...
CVPR
2012
IEEE
13 years 6 months ago
The Shape Boltzmann Machine: A strong model of object shape
A good model of object shape is essential in applications such as segmentation, object detection, inpainting and graphics. For example, when performing segmentation, local constra...
S. M. Ali Eslami, Nicolas Heess, John M. Winn
AAAI
2006
15 years 5 months ago
Real-Time Evolution of Neural Networks in the NERO Video Game
A major goal for AI is to allow users to interact with agents that learn in real time, making new kinds of interactive simulations, training applications, and digital entertainmen...
Kenneth O. Stanley, Bobby D. Bryant, Igor Karpov, ...
ICASSP
2008
IEEE
15 years 10 months ago
Nested support vector machines
The one-class and cost-sensitive support vector machines (SVMs) are state-of-the-art machine learning methods for estimating density level sets and solving weighted classificatio...
Gyemin Lee, Clayton Scott