Sciweavers

742 search results - page 127 / 149
» Constructing Hierarchical Rule Systems
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 6 days ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ATAL
2007
Springer
13 years 12 months ago
A methodology for 3D electronic institutions
In this paper we propose a methodology for the construction of 3D electronic institutions. 3D electronic institutions are normative environments where software and human agents ca...
Anton Bogdanovych, Marc Esteva, Simeon J. Simoff, ...
GECCO
2008
Springer
148views Optimization» more  GECCO 2008»
13 years 9 months ago
Supply chain management sales using XCSR
The Trading Agent Competition in its category Supply Chain Management (TAC SCM) is an international forum where teams construct agents that control a computer assembly company in ...
María A. Franco, Ivette C. Martínez,...
CORR
2010
Springer
187views Education» more  CORR 2010»
13 years 8 months ago
Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit
We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. In this problem, at each time, a player chooses K out of N (N > K) arms to play. The state of ...
Haoyang Liu, Keqin Liu, Qing Zhao
INTERSPEECH
2010
13 years 2 months ago
Text normalization based on statistical machine translation and internet user support
In this paper, we describe and compare systems for text normalization based on statistical machine translation (SMT) methods which are constructed with the support of internet use...
Tim Schlippe, Chenfei Zhu, Jan Gebhardt, Tanja Sch...