Sciweavers

710 search results - page 73 / 142
» An Approach for Detecting Learning Styles in Learning Manage...
Sort
View
NIPS
1998
13 years 9 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 8 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CIKM
2008
Springer
13 years 10 months ago
Learning the distance metric in a personal ontology
Personal ontology construction is the task of sorting through relevant materials, identifying the main topics and concepts, and organizing them to suit personal needs. Automatic c...
Hui Yang, Jamie Callan
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
12 years 3 months ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...
CVPR
2009
IEEE
1002views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Classifier Grids for Robust Adaptive Object Detection
In this paper we present an adaptive but robust object detector for static cameras by introducing classifier grids. Instead of using a sliding window for object detection we pro...
Peter M. Roth, Sabine Sternig, Helmut Grabner, Hor...