Sciweavers

305 search results - page 51 / 61
» Role mining based on weights
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 7 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
IJON
2007
117views more  IJON 2007»
13 years 7 months ago
Learning sensory representations with intrinsic plasticity
Intrinsic plasticity (IP) refers to a neuron’s ability to regulate its firing activity by adapting its intrinsic excitability. Previously, we showed that model neurons combinin...
Nicholas Butko, Jochen Triesch
BC
2005
71views more  BC 2005»
13 years 7 months ago
The spatiotemporal learning rule and its efficiency in separating spatiotemporal patterns
The hippocampus plays an important role in the course of establishing long-term memory, i.e., to make short-term memory of spatially and temporally associated input information. In...
M. Tsukada, X. Pan
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 6 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ICDM
2010
IEEE
146views Data Mining» more  ICDM 2010»
13 years 5 months ago
One-Class Matrix Completion with Low-Density Factorizations
Consider a typical recommendation problem. A company has historical records of products sold to a large customer base. These records may be compactly represented as a sparse custom...
Vikas Sindhwani, Serhat Selcuk Bucak, Jianying Hu,...