Sciweavers

2015 search results - page 64 / 403
» Hidden Software Capabilities
Sort
View
ETRICS
2006
14 years 24 days ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
ESANN
2003
13 years 10 months ago
Approximation of Function by Adaptively Growing Radial Basis Function Neural Networks
In this paper a neural network for approximating function is described. The activation functions of the hidden nodes are the Radial Basis Functions (RBF) whose parameters are learn...
Jianyu Li, Siwei Luo, Yingjian Qi
NIPS
2001
13 years 10 months ago
Generalizable Relational Binding from Coarse-coded Distributed Representations
We present a model of binding of relationship information in a spatial domain (e.g., square above triangle) that uses low-order coarse-coded conjunctive representations instead of...
Randall C. O'Reilly, R. S. Busby
PR
2008
145views more  PR 2008»
13 years 9 months ago
Gesture spotting with body-worn inertial sensors to detect user activities
We present a method for spotting sporadically occurring gestures in a continuous data stream from body-worn inertial sensors. Our method is based on a natural partitioning of cont...
Holger Junker, Oliver Amft, Paul Lukowicz, Gerhard...
DATAMINE
1998
126views more  DATAMINE 1998»
13 years 8 months ago
An Extension to SQL for Mining Association Rules
Data mining evolved as a collection of applicative problems and efficient solution algorithms relative to rather peculiar problems, all focused on the discovery of relevant infor...
Rosa Meo, Giuseppe Psaila, Stefano Ceri