Sciweavers

307 search results - page 32 / 62
» Host Based Intrusion Detection using Machine Learning
Sort
View
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 2 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
CVPR
2007
IEEE
14 years 9 months ago
Learning Kernel Expansions for Image Classification
Kernel machines (e.g. SVM, KLDA) have shown state-ofthe-art performance in several visual classification tasks. The classification performance of kernel machines greatly depends o...
Fernando De la Torre, Oriol Vinyals
ICCV
2009
IEEE
14 years 1 months ago
Joint Pose Estimator and Feature Learning for Object Detection
A new learning strategy for object detection is presented. The proposed scheme forgoes the need to train a collection of detectors dedicated to homogeneous families of poses, an...
Karim Ali, Francois Fleuret, David Hasler and Pasc...
ICML
2005
IEEE
14 years 8 months ago
Linear Asymmetric Classifier for cascade detectors
The detection of faces in images is fundamentally a rare event detection problem. Cascade classifiers provide an efficient computational solution, by leveraging the asymmetry in t...
Jianxin Wu, Matthew D. Mullin, James M. Rehg
ECTEL
2006
Springer
13 years 11 months ago
An Exploratory Study of the Relationship Between Learning Styles and Cognitive Traits
To provide personalization and adaptivity in technology enhanced learning systems, the needs of learners have to be known by the system first. Detecting these needs is a challengin...
Sabine Graf, Taiyu Lin, Lynn Jeffrey, Kinshuk