Sciweavers

1591 search results - page 197 / 319
» Hybrid decision tree
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 3 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
AIME
1997
Springer
14 years 2 months ago
Detecting Very Early Stages of Dementia from Normal Aging with Machine Learning Methods
We used Machine Learning (ML) methods to learn the best decision rules to distinguish normal brain aging from the earliest stages of dementia using subsamples of 198 normal and 244...
William Rodman Shankle, Subramani Mani, Michael J....
BMCBI
2008
87views more  BMCBI 2008»
13 years 10 months ago
Identification of deleterious non-synonymous single nucleotide polymorphisms using sequence-derived information
Background: As the number of non-synonymous single nucleotide polymorphisms (nsSNPs), also known as single amino acid polymorphisms (SAPs), increases rapidly, computational method...
Jing Hu, Changhui Yan
JMLR
2006
132views more  JMLR 2006»
13 years 10 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
NAACL
2010
13 years 8 months ago
Dialogue-Oriented Review Summary Generation for Spoken Dialogue Recommendation Systems
In this paper we present an opinion summarization technique in spoken dialogue systems. Opinion mining has been well studied for years, but very few have considered its applicatio...
Jingjing Liu, Stephanie Seneff, Victor Zue