Sciweavers

396 search results - page 62 / 80
» Evaluating high accuracy retrieval techniques
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
14 years 1 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
IMC
2004
ACM
14 years 1 months ago
MultiQ: automated detection of multiple bottleneck capacities along a path
multiQ is a passive capacity measurement tool suitable for largescale studies of Internet path characteristics. It is the first passive tool that discovers the capacity of multip...
Sachin Katti, Dina Katabi, Charles Blake, Eddie Ko...
SEKE
2004
Springer
14 years 28 days ago
Supporting the Requirements Prioritization Process. A Machine Learning approach
Requirements prioritization plays a key role in the requirements engineering process, in particular with respect to critical tasks such as requirements negotiation and software re...
Paolo Avesani, Cinzia Bazzanella, Anna Perini, Ang...
SIGIR
2003
ACM
14 years 25 days ago
A maximal figure-of-merit learning approach to text categorization
A novel maximal figure-of-merit (MFoM) learning approach to text categorization is proposed. Different from the conventional techniques, the proposed MFoM method attempts to integ...
Sheng Gao, Wen Wu, Chin-Hui Lee, Tat-Seng Chua