Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
In medical image analysis, the image content is often represented by computed features that need to be interpreted at a clinical level of understanding to support lopment of clini...
Birgit Lessmann, Tim W. Nattkemper, V. H. Hans, An...
Unsupervised online learning in commercial computer games allows computer-controlled opponents to adapt to the way the game is being played. As such it provides a mechanism to deal...
Pieter Spronck, Ida G. Sprinkhuizen-Kuyper, Eric O...
Background: We present a novel method of protein fold decoy discrimination using machine learning, more specifically using neural networks. Here, decoy discrimination is represent...
Growing up is in large measure learning about the world and our social and linguistic environment. We might call this data mining, although it is far more multimodal and immersive...