Sciweavers

174 search results - page 10 / 35
» Applying Machine Learning Techniques to Rule Generation in I...
Sort
View
MC
2003
157views Computer Science» more  MC 2003»
13 years 8 months ago
From Adaptive Hypermedia to the Adaptive Web
Web systems suffer from an inability to satisfy heterogeneous needs of many users. A remedy for the negative effects of the traditional "one-size-fits-all'' approac...
Peter Brusilovsky
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 12 hour ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
APSEC
2009
IEEE
13 years 5 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
ML
2006
ACM
143views Machine Learning» more  ML 2006»
13 years 7 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 1 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...