Sciweavers

37 search results - page 5 / 8
» Fast Feature Selection by Means of Projections
Sort
View
ICPR
2008
IEEE
14 years 1 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
INFSOF
2002
147views more  INFSOF 2002»
13 years 7 months ago
On the efficiency of domain-based COTS product selection method
Use of commercial-off-the-shelf (COTS) products is becoming a popular software development method. Current methods of selecting COTS products involve using the intuition of softwa...
Karl R. P. H. Leung, Hareton K. N. Leung
MINENET
2006
ACM
14 years 1 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger
ICMLA
2008
13 years 9 months ago
Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection
Spam sender detection based on email subject data is a complex large-scale text mining task. The dataset consists of email subject lines and the corresponding IP address of the em...
Yuchun Tang, Yuanchen He, Sven Krasser
PAMI
2010
124views more  PAMI 2010»
13 years 2 months ago
Two-Dimensional Polar Harmonic Transforms for Invariant Image Representation
This paper introduces a set of 2D transforms, based on a set of orthogonal projection bases, to generate a set of features which are invariant to rotation. We call these transforms...
Pew-Thian Yap, Xudong Jiang, Alex ChiChung Kot