Sciweavers

165 search results - page 28 / 33
» Why Machine Ethics
Sort
View
RAID
1999
Springer
14 years 2 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
14 years 1 months ago
Evolutionary learning with kernels: a generic solution for large margin problems
In this paper we embed evolutionary computation into statistical learning theory. First, we outline the connection between large margin optimization and statistical learning and s...
Ingo Mierswa
LISA
2003
13 years 11 months ago
DryDock: A Document Firewall
Auditing a web siteā€™s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why itā...
Deepak Giridharagopal
BMCBI
2008
114views more  BMCBI 2008»
13 years 10 months ago
Visualization of large influenza virus sequence datasets using adaptively aggregated trees with sampling-based subscale represen
Background: With the amount of influenza genome sequence data growing rapidly, researchers need machine assistance in selecting datasets and exploring the data. Enhanced visualiza...
Leonid Zaslavsky, Yiming Bao, Tatiana A. Tatusova
ML
2007
ACM
156views Machine Learning» more  ML 2007»
13 years 9 months ago
Active learning for logistic regression: an evaluation
Which active learning methods can we expect to yield good performance in learning binary and multi-category logistic regression classiļ¬ers? Addressing this question is a natural ...
Andrew I. Schein, Lyle H. Ungar