Sciweavers

251 search results - page 34 / 51
» Using Rough Set and Support Vector Machine for Network Intru...
Sort
View
136
Voted
VIZSEC
2005
Springer
15 years 8 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
117
Voted
ICML
2005
IEEE
16 years 3 months ago
Learning class-discriminative dynamic Bayesian networks
In many domains, a Bayesian network's topological structure is not known a priori and must be inferred from data. This requires a scoring function to measure how well a propo...
John Burge, Terran Lane
117
Voted
TCSV
2008
211views more  TCSV 2008»
15 years 2 months ago
Audio-Assisted Movie Dialogue Detection
An audio-assisted system is investigated that detects if a movie scene is a dialogue or not. The system is based on actor indicator functions. That is, functions which define if an...
Margarita Kotti, Dimitrios Ververidis, Georgios Ev...
123
Voted
NAR
2011
182views Computer Vision» more  NAR 2011»
14 years 5 months ago
PAIR: the predicted Arabidopsis interactome resource
The predicted Arabidopsis interactome resource (PAIR, http://www.cls.zju.edu.cn/pair/), comprised of 5990 experimentally reported molecular interactions in Arabidopsis thaliana to...
Mingzhi Lin, Xueling Shen, Xin Chen
CSE
2009
IEEE
15 years 9 months ago
Predicting Interests of People on Online Social Networks
—We introduce a new data set which contains both a self-declared friendship network and self-chosen attributes from a finite list defined by the social networking site. We prop...
Apoorv Agarwal, Owen Rambow, Nandini Bhardwaj