Sciweavers

912 search results - page 113 / 183
» Anomaly
Sort
View
ANLP
2000
108views more  ANLP 2000»
13 years 10 months ago
Evaluating Automatic Dialogue Strategy Adaptation for a Spoken Dialogue System
In this paper, we describe an empirical evaluation of an adaptive mixed initiative spoken dialogue system. We conducted two sets of experiments to evaluate the mixed initiative an...
Jennifer Chu-Carroll
USENIX
2000
13 years 10 months ago
Traffic Data Repository at the WIDE Project
It becomes increasingly important for both network researchers and operators to know the trend of network traffic and to find anomaly in their network traffic. This paper describe...
Kenjiro Cho, Koushirou Mitsuya, Akira Kato
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
13 years 10 months ago
Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions
Affinity functions are the core components in negative selection to discriminate self from non-self. It has been shown that affinity functions such as the r-contiguous distance an...
Thomas Stibor
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 9 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 9 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith