Sciweavers

1315 search results - page 135 / 263
» Discovering significant rules
Sort
View
JSAC
2006
172views more  JSAC 2006»
15 years 4 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
ICPR
2010
IEEE
15 years 2 months ago
Boosting Bayesian MAP Classification
In this paper we redefine and generalize the classic k-nearest neighbors (k-NN) voting rule in a Bayesian maximum-a-posteriori (MAP) framework. Therefore, annotated examples are u...
Paolo Piro, Richard Nock, Frank Nielsen, Michel Ba...

Publication
383views
17 years 5 months ago
The Cathedral and the Bazaar
Ever wondered why open source finally yields products that work? Eric Raymod discusses that in this paper using the bazaar as a metaphor for open source hacker developed software t...
Eric Raymond
CHI
2002
ACM
16 years 5 months ago
Gaze behavior of talking faces makes a difference
We present the results of an experiment investigating the effects of a talking head's gaze behavior on the user's quality assessment of the interface. We compared a vers...
Ivo van Es, Dirk Heylen, Betsy van Dijk, Anton Nij...
119
Voted
CADE
2006
Springer
16 years 5 months ago
An Interpretation of Isabelle/HOL in HOL Light
We define an interpretation of the Isabelle/HOL logic in HOL Light and its metalanguage, OCaml. Some aspects of the Isabelle logic are not representable directly in the HOL Light o...
Sean McLaughlin