Sciweavers

2767 search results - page 467 / 554
» Universal Exponentiation Algorithm
Sort
View
ICDM
2003
IEEE
102views Data Mining» more  ICDM 2003»
14 years 2 months ago
Bootstrapping Rule Induction
Most rule learning systems posit hard decision boundaries for continuous attributes and point estimates of rule accuracy, with no measures of variance, which may seem arbitrary to ...
Lemuel R. Waitman, Douglas H. Fisher, Paul H. King
ICPP
2003
IEEE
14 years 2 months ago
Exploiting Client Caches: An Approach to Building Large Web Caches
New demands brought by the continuing growth of the Internet will be met in part by more effective and comprehensive use of caching. This paper proposes to exploit client browser ...
Yingwu Zhu, Yiming Hu
SAINT
2003
IEEE
14 years 2 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
COLT
2003
Springer
14 years 2 months ago
Sequence Prediction Based on Monotone Complexity
This paper studies sequence prediction based on the monotone Kolmogorov complexity Km=−log m, i.e. based on universal deterministic/one-part MDL. m is extremely close to Solomon...
Marcus Hutter
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad