Sciweavers

134 search results - page 23 / 27
» Ensembles of Grafted Trees
Sort
View
ICONIP
2004
13 years 9 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
JNCA
2007
179views more  JNCA 2007»
13 years 7 months ago
Modeling intrusion detection system using hybrid intelligent systems
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Sandhya Peddabachigari, Ajith Abraham, Crina Grosa...
CASCON
2004
129views Education» more  CASCON 2004»
13 years 9 months ago
Building predictors from vertically distributed data
Due in part to the large volume of data available today, but more importantly to privacy concerns, data are often distributed across institutional, geographical and organizational...
Sabine M. McConnell, David B. Skillicorn
KDD
2004
ACM
117views Data Mining» more  KDD 2004»
14 years 8 months ago
Systematic data selection to mine concept-drifting data streams
One major problem of existing methods to mine data streams is that it makes ad hoc choices to combine most recent data with some amount of old data to search the new hypothesis. T...
Wei Fan
JCT
2007
94views more  JCT 2007»
13 years 7 months ago
A bijection between 2-triangulations and pairs of non-crossing Dyck paths
A k-triangulation of a convex polygon is a maximal set of diagonals so that no k + 1 of them mutually cross in their interiors. We present a bijection between 2-triangulations of a...
Sergi Elizalde