Sciweavers

1274 search results - page 135 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
15 years 4 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
EUROGP
2009
Springer
130views Optimization» more  EUROGP 2009»
15 years 10 months ago
One-Class Genetic Programming
One-class classification naturally only provides one-class of exemplars, the target class, from which to construct the classification model. The one-class approach is constructed...
Robert Curry, Malcolm I. Heywood
134
Voted
ICDM
2003
IEEE
95views Data Mining» more  ICDM 2003»
15 years 9 months ago
Evolutionary Gabor Filter Optimization with Application to Vehicle Detection
Abstract—Despite the considerable amount of research work on the application of Gabor filters in pattern classification, their design and selection have been mostly done on a t...
Zehang Sun, George Bebis, Ronald Miller
WABI
2009
Springer
124views Bioinformatics» more  WABI 2009»
15 years 10 months ago
Mimosa: Mixture Model of Co-expression to Detect Modulators of Regulatory Interaction
Background: Functionally related genes tend to be correlated in their expression patterns across multiple conditions and/or tissue-types. Thus co-expression networks are often use...
Matthew Hansen, Logan Everett, Larry Singh, Sridha...
150
Voted
TKDE
2008
134views more  TKDE 2008»
15 years 4 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan