Sciweavers

307 search results - page 40 / 62
» Host Based Intrusion Detection using Machine Learning
Sort
View
CICLING
2008
Springer
13 years 9 months ago
Semantic and Syntactic Features for Dutch Coreference Resolution
We investigate the effect of encoding additional semantic and syntactic information sources in a classification-based machine learning approach to the task of coreference resolutio...
Iris Hendrickx, Véronique Hoste, Walter Dae...
WWW
2010
ACM
14 years 2 months ago
Identifying spam link generators for monitoring emerging web spam
In this paper, we address the question of how we can identify hosts that will generate links to web spam. Detecting such spam link generators is important because almost all new s...
Young-joo Chung, Masashi Toyoda, Masaru Kitsuregaw...
ICML
2001
IEEE
14 years 8 months ago
Bayesian approaches to failure prediction for disk drives
Hard disk drive failures are rare but are often costly. The ability to predict failures is important to consumers, drive manufacturers, and computer system manufacturers alike. In...
Greg Hamerly, Charles Elkan
ICSM
2006
IEEE
14 years 1 months ago
Using the Case-Based Ranking Methodology for Test Case Prioritization
The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most ...
Paolo Tonella, Paolo Avesani, Angelo Susi
ICMCS
2008
IEEE
330views Multimedia» more  ICMCS 2008»
14 years 1 months ago
Automatic trademark detection and recognition in sport videos
In this paper we describe a system for automatic detection and recognition of trademarks in sports videos. We propose a compact representation of trademarks based on SIFT feature ...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...