Sciweavers

705 search results - page 122 / 141
» Unsupervised Learning Using MML
Sort
View
ISMIS
2005
Springer
14 years 2 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ICDM
2010
IEEE
99views Data Mining» more  ICDM 2010»
13 years 6 months ago
A System for Mining Temporal Physiological Data Streams for Advanced Prognostic Decision Support
We present a mining system that can predict the future health status of the patient using the temporal trajectories of health status of a set of similar patients. The main noveltie...
Jimeng Sun, Daby Sow, Jianying Hu, Shahram Ebadoll...
EMNLP
2011
12 years 8 months ago
Inducing Sentence Structure from Parallel Corpora for Reordering
When translating among languages that differ substantially in word order, machine translation (MT) systems benefit from syntactic preordering—an approach that uses features fro...
John DeNero, Jakob Uszkoreit
UAI
2003
13 years 10 months ago
On the Convergence of Bound Optimization Algorithms
Many practitioners who use EM and related algorithms complain that they are sometimes slow. When does this happen, and what can be done about it? In this paper, we study the gener...
Ruslan Salakhutdinov, Sam T. Roweis, Zoubin Ghahra...
CVPR
2008
IEEE
14 years 10 months ago
A deformable local image descriptor
This paper presents a novel local image descriptor that is robust to general image deformations. A limitation with traditional image descriptors is that they use a single support ...
Hong Cheng, Zicheng Liu, Nanning Zheng, Jie Yang