Sciweavers

307 search results - page 54 / 62
» Host Based Intrusion Detection using Machine Learning
Sort
View
CONEXT
2010
ACM
13 years 5 months ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
ICPR
2010
IEEE
14 years 1 months ago
On-Line Random Naive Bayes for Tracking
—Randomized learning methods (i.e., Forests or Ferns) have shown excellent capabilities for various computer vision applications. However, it was shown that the tree structure in...
Martin Godec, Christian Leistner, Amir Saffari, Ho...
MLMI
2005
Springer
14 years 29 days ago
The TNO Speaker Diarization System for NIST RT05s Meeting Data
The TNO speaker speaker diarization system is based on a standard BIC segmentation and clustering algorithm. Since for the NIST Rich Transcription speaker dizarization evaluation m...
David van Leeuwen
IPPS
2009
IEEE
14 years 2 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
COLING
2010
13 years 2 months ago
Sentiment Classification and Polarity Shifting
Polarity shifting marked by various linguistic structures has been a challenge to automatic sentiment classification. In this paper, we propose a machine learning approach to inco...
Shoushan Li, Sophia Yat Mei Lee, Ying Chen, Chu-Re...