Sciweavers

929 search results - page 110 / 186
» heuristics 2008
Sort
View
ICONIP
2008
13 years 10 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
MASCOTS
2008
13 years 10 months ago
Sensitivity Based Power Management of Enterprise Storage Systems
Energy-efficiency is a key requirement in data centers today. Storage systems constitute a significant fraction of the energy consumed in a data center and therefore enterprise st...
Sriram Sankar, Sudhanva Gurumurthi, Mircea R. Stan
NETWORKING
2008
13 years 10 months ago
Distributed PLR-Based Backup Path Computation in MPLS Networks
In this article, we provide mechanisms enabling the backup path computation to be performed on-line and locally by the Points of Local Repair (PLRs), in the context of the MPLS-TE ...
Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le ...
NIPS
2008
13 years 10 months ago
The Recurrent Temporal Restricted Boltzmann Machine
The Temporal Restricted Boltzmann Machine (TRBM) is a probabilistic model for sequences that is able to successfully model (i.e., generate nice-looking samples of) several very hi...
Ilya Sutskever, Geoffrey E. Hinton, Graham W. Tayl...
ODR
2008
13 years 10 months ago
A Multi-Agent Architecture for Online Dispute Resolution Services
: Argumentation theory is often used in multi agent-systems to facilitate autonomous agent reasoning and multi-agent interaction. The technology can also be used to develop online ...
Brooke Abrahams, John Zeleznikow