Sciweavers

716 search results - page 127 / 144
» Proactive Network Maintenance Using Machine Learning
Sort
View
IJCNN
2000
IEEE
14 years 13 days ago
Continuous Optimization of Hyper-Parameters
Many machine learning algorithms can be formulated as the minimization of a training criterion which involves (1) \training errors" on each training example and (2) some hype...
Yoshua Bengio
ISORC
2000
IEEE
14 years 13 days ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 8 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
SIGCSE
2002
ACM
153views Education» more  SIGCSE 2002»
13 years 7 months ago
A communication library to support concurrent programming courses
A number of communication libraries have been written to support concurrent programming. For a variety of reasons, these libraries generally are not well-suited for use in undergr...
Steve Carr, Changpeng Fang, Tim Jozwowski, Jean Ma...
ECTEL
2006
Springer
13 years 11 months ago
Peer-to-peer Face-to-face Collaboration
In this paper, we present a proof of concept application of a technique that is designed explicitly for face to face collaboration software architectures. The objective is to minim...
Delfina Malandrino, Ilaria Manno