Sciweavers

1196 search results - page 154 / 240
» Using Machine Learning Techniques to Combine Forecasting Met...
Sort
View
NOSSDAV
2009
Springer
14 years 3 months ago
Rapid identification of Skype traffic flows
In this paper we present results of experimental work using machine learning techniques to rapidly identify Skype traffic. We show that Skype traffic can be identified by observin...
Philip Branch, Amiel Heyde, Grenville J. Armitage
IJCAI
2001
13 years 10 months ago
Reinforcement Learning in Distributed Domains: Beyond Team Games
Using a distributed algorithm rather than a centralized one can be extremely beneficial in large search problems. In addition, the incorporation of machine learning techniques lik...
David Wolpert, Joseph Sill, Kagan Tumer
IJNSEC
2010
141views more  IJNSEC 2010»
13 years 3 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
ICML
2004
IEEE
14 years 10 months ago
Surrogate maximization/minimization algorithms for AdaBoost and the logistic regression model
Surrogate maximization (or minimization) (SM) algorithms are a family of algorithms that can be regarded as a generalization of expectation-maximization (EM) algorithms. There are...
Zhihua Zhang, James T. Kwok, Dit-Yan Yeung
ICML
2010
IEEE
13 years 10 months ago
A Theoretical Analysis of Feature Pooling in Visual Recognition
Many modern visual recognition algorithms incorporate a step of spatial `pooling', where the outputs of several nearby feature detectors are combined into a local or global `...
Y-Lan Boureau, Jean Ponce, Yann LeCun