Sciweavers

577 search results - page 88 / 116
» Mixing independent classifiers
Sort
View
ICARIS
2007
Springer
14 years 2 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
ICMCS
2006
IEEE
191views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Semantic Multimedia Retrieval using Lexical Query Expansion and Model-Based Reranking
We present methods for improving text search retrieval of visual multimedia content by applying a set of visual models of semantic concepts from a lexicon of concepts deemed relev...
Alexander Haubold, Apostol Natsev, Milind R. Napha...
IJCNLP
2005
Springer
14 years 2 months ago
A Method of Recognizing Entity and Relation
The entity and relation recognition, i.e. (1) assigning semantic classes to entities in a sentence, and (2) determining the relations held between entities, is an important task in...
Xinghua Fan, Maosong Sun
DEXA
2004
Springer
94views Database» more  DEXA 2004»
14 years 2 months ago
Visualization Process of Temporal Data
Abstract. Temporal data are abundantly present in many application domains such as banking, financial, clinical, geographical applications and so on. Temporal data have been extens...
Chaouki Daassi, Laurence Nigay, Marie-Christine Fa...
ACSAC
2003
IEEE
14 years 2 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...