Sciweavers

251 search results - page 34 / 51
» Using Rough Set and Support Vector Machine for Network Intru...
Sort
View
VIZSEC
2005
Springer
14 years 2 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
ICML
2005
IEEE
14 years 9 months ago
Learning class-discriminative dynamic Bayesian networks
In many domains, a Bayesian network's topological structure is not known a priori and must be inferred from data. This requires a scoring function to measure how well a propo...
John Burge, Terran Lane
TCSV
2008
211views more  TCSV 2008»
13 years 8 months ago
Audio-Assisted Movie Dialogue Detection
An audio-assisted system is investigated that detects if a movie scene is a dialogue or not. The system is based on actor indicator functions. That is, functions which define if an...
Margarita Kotti, Dimitrios Ververidis, Georgios Ev...
NAR
2011
182views Computer Vision» more  NAR 2011»
12 years 11 months ago
PAIR: the predicted Arabidopsis interactome resource
The predicted Arabidopsis interactome resource (PAIR, http://www.cls.zju.edu.cn/pair/), comprised of 5990 experimentally reported molecular interactions in Arabidopsis thaliana to...
Mingzhi Lin, Xueling Shen, Xin Chen
CSE
2009
IEEE
14 years 3 months ago
Predicting Interests of People on Online Social Networks
—We introduce a new data set which contains both a self-declared friendship network and self-chosen attributes from a finite list defined by the social networking site. We prop...
Apoorv Agarwal, Owen Rambow, Nandini Bhardwaj