Sciweavers

795 search results - page 71 / 159
» Feature Selection for Inductive Generalization
Sort
View
INCDM
2010
Springer
125views Data Mining» more  INCDM 2010»
13 years 10 months ago
Web-Site Boundary Detection
Defining the boundaries of a web-site, for (say) archiving or information retrieval purposes, is an important but complicated task. In this paper a web-page clustering approach to...
Ayesh Alshukri, Frans Coenen, Michele Zito
RAID
1999
Springer
14 years 13 days ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
ICIP
2008
IEEE
14 years 2 months ago
Blind image steganalysis based on run-length histogram analysis
In this paper, a new, simple but effective method is proposed for blind image steganalysis, which is based on run-length histogram analysis. Higher-order statistics of characteris...
Jing Dong, Tieniu Tan
IROS
2009
IEEE
150views Robotics» more  IROS 2009»
14 years 2 months ago
Learning locomotion over rough terrain using terrain templates
— We address the problem of foothold selection in robotic legged locomotion over very rough terrain. The difficulty of the problem we address here is comparable to that of human...
Mrinal Kalakrishnan, Jonas Buchli, Peter Pastor, S...
HPCA
2009
IEEE
14 years 8 months ago
Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics
The shrinking processor feature size, lower threshold voltage and increasing clock frequency make modern processors highly vulnerable to transient faults. Architectural Vulnerabil...
Lide Duan, Bin Li, Lu Peng