Sciweavers

742 search results - page 123 / 149
» Constructing Hierarchical Rule Systems
Sort
View
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 19 days ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
ICCS
2001
Springer
14 years 13 days ago
Statistical Models for Automatic Performance Tuning
Achieving peak performance from library subroutines usually requires extensive, machine-dependent tuning by hand. Automatic tuning systems have emerged in response, and they typic...
Rich Vuduc, James Demmel, Jeff Bilmes
ICFP
2000
ACM
14 years 11 days ago
Intersection types and computational effects
We show that standard formulations of intersection type systems are unsound in the presence of computational effects, and propose a solution similar to the value restriction for ...
Rowan Davies, Frank Pfenning
GIS
1992
ACM
14 years 2 days ago
Machine Induction of Geospatial Knowledge
Machine learning techniques such as tree induction have become accepted tools for developing generalisations of large data sets, typically for use with production rule systems in p...
Peter A. Whigham, Robert I. McKay, J. R. Davis