Sciweavers

2665 search results - page 486 / 533
» Bundle Methods for Machine Learning
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
CIKM
2009
Springer
14 years 2 months ago
(Not) yet another matcher
Discovering correspondences between schema elements is a crucial task for data integration. Most schema matching tools are semiautomatic, e.g. an expert must tune some parameters ...
Fabien Duchateau, Remi Coletta, Zohra Bellahsene, ...
ISVC
2009
Springer
14 years 2 months ago
Combinatorial Preconditioners and Multilevel Solvers for Problems in Computer Vision and Image Processing
Abstract. Linear systems and eigen-calculations on symmetric diagonally dominant matrices (SDDs) occur ubiquitously in computer vision, computer graphics, and machine learning. In ...
Ioannis Koutis, Gary L. Miller, David Tolliver
PKDD
2009
Springer
147views Data Mining» more  PKDD 2009»
14 years 2 months ago
Kernel Polytope Faces Pursuit
Abstract. Polytope Faces Pursuit (PFP) is a greedy algorithm that approximates the sparse solutions recovered by 1 regularised least-squares (Lasso) [4,10] in a similar vein to (Or...
Tom Diethe, Zakria Hussain
ICEIS
2008
IEEE
14 years 2 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya