Sciweavers

1225 search results - page 193 / 245
» The Instance Complexity Conjecture
Sort
View
IJHIS
2008
84views more  IJHIS 2008»
13 years 9 months ago
Selective generation of training examples in active meta-learning
Meta-Learning has been successfully applied to acquire knowledge used to support the selection of learning algorithms. Each training example in Meta-Learning (i.e. each meta-exampl...
Ricardo Bastos Cavalcante Prudêncio, Teresa ...
JNSM
2008
93views more  JNSM 2008»
13 years 9 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
IANDC
2007
151views more  IANDC 2007»
13 years 9 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
IS
2007
13 years 9 months ago
Semantic optimization techniques for preference queries
Preference queries are relational algebra or SQL queries that contain occurrences of the winnow operator (find the most preferred tuples in a given relation). Such queries are pa...
Jan Chomicki
TCSV
2008
150views more  TCSV 2008»
13 years 9 months ago
Mining Recurring Events Through Forest Growing
Recurring events are short temporal patterns that consist of multiple instances in the target database. Without any a priori knowledge of the recurring events, in terms of their le...
Junsong Yuan, Jingjing Meng, Ying Wu, Jiebo Luo