Sciweavers

716 search results - page 72 / 144
» Proactive Network Maintenance Using Machine Learning
Sort
View
SEAL
1998
Springer
14 years 3 days ago
Robust Evolution Strategies
This paper empirically investigates the use and behaviour of Evolution Strategies (ES) algorithms on problems such as function optimisation and the use of evolutionary artificial ...
Kazuhiro Ohkura, Yoshiyuki Matsumura, Kanji Ueda
ESANN
2001
13 years 9 months ago
Coding the outputs of multilayer feedforward
In this paper, we present an empirical comparison among four different schemes of coding the outputs of a Multilayer Feedforward networks. Results are obtained for eight different ...
Mercedes Fernández-Redondo, Carlos Hern&aac...
RAID
2000
Springer
13 years 11 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
IJCNN
2000
IEEE
14 years 8 days ago
A Neural Support Vector Network Architecture with Adaptive Kernels
In the Support Vector Machines (SVM) framework, the positive-definite kernel can be seen as representing a fixed similarity measure between two patterns, and a discriminant func...
Pascal Vincent, Yoshua Bengio
CCS
2010
ACM
13 years 8 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami