메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 43-52

Autonomic feature selection for application classification

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN NETWORKS; COMPUTER NETWORKS; COMPUTER SOFTWARE SELECTION AND EVALUATION; DATA STORAGE EQUIPMENT; ENCODING (SYMBOLS); PROBABILISTIC LOGICS;

EID: 34247564287     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (34)
  • 5
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • J. Kephart and D. Chess, "The vision of autonomic computing," Computer, vol. 36, no. 1, pp. 41-50, 2003.
    • (2003) Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.1    Chess, D.2
  • 7
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • June
    • R. P. Goldberg, "Survey of virtual machine research," IEEE Computer Magazine, vol. 7, no. 6, pp. 34-45, June 1974.
    • (1974) IEEE Computer Magazine , vol.7 , Issue.6 , pp. 34-45
    • Goldberg, R.P.1
  • 9
    • 17044405923 scopus 로고    scopus 로고
    • Toward integrating feature selection algorithms for classification and clustering
    • Apr
    • H. Liu and L. Yu, "Toward integrating feature selection algorithms for classification and clustering," IEEE Trans. Knowl. Data Eng., vol. 17, no. 4, pp. 491-502, Apr. 2005.
    • (2005) IEEE Trans. Knowl. Data Eng , vol.17 , Issue.4 , pp. 491-502
    • Liu, H.1    Yu, L.2
  • 12
    • 84987031663 scopus 로고
    • Depts. of Computer Science and Medicine, Stanford University, Tech. Rep
    • D. Heckerman, "Probabilistic similarity networks," Depts. of Computer Science and Medicine, Stanford University, Tech. Rep., 1990.
    • (1990) Probabilistic similarity networks
    • Heckerman, D.1
  • 19
    • 0001290841 scopus 로고    scopus 로고
    • Glossary of terms
    • R. Kohavi and F. Provost, "Glossary of terms," Machine Learning, vol. 30, pp. 271-274, 1998.
    • (1998) Machine Learning , vol.30 , pp. 271-274
    • Kohavi, R.1    Provost, F.2
  • 22
    • 0030104983 scopus 로고    scopus 로고
    • Benchmarking with real industrial applications: The spec high-performance group
    • R. Eigenmann and S. Hassanzadeh, "Benchmarking with real industrial applications: the spec high-performance group," IEEE Computational Science and Engineering, vol. 3, no. 1, pp. 18-23, 1996.
    • (1996) IEEE Computational Science and Engineering , vol.3 , Issue.1 , pp. 18-23
    • Eigenmann, R.1    Hassanzadeh, S.2
  • 23
    • 34247577299 scopus 로고    scopus 로고
    • Http://www.netapp.com/tech_library/3022.html. [Online]. Available: http://www.netapp.com/tech_library/3022.html
    • Http://www.netapp.com/tech_library/3022.html. [Online]. Available: http://www.netapp.com/tech_library/3022.html
  • 25
    • 33745561205 scopus 로고    scopus 로고
    • An introduction to variable and feature selection
    • Mar
    • I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," J. Mach. Learn. Res., vol. 3, pp. 1157-1182, Mar. 2003.
    • (2003) J. Mach. Learn. Res , vol.3 , pp. 1157-1182
    • Guyon, I.1    Elisseeff, A.2
  • 26
    • 0036522403 scopus 로고    scopus 로고
    • Unsupervised feature selection using feature similarity
    • Mar
    • P. Mitra, C. Murthy, and S. Pal, "Unsupervised feature selection using feature similarity," IEEE Trans. Pat. Anal. Mach. Intel., vol. 24, no. 3, pp. 301-312, Mar. 2002.
    • (2002) IEEE Trans. Pat. Anal. Mach. Intel , vol.24 , Issue.3 , pp. 301-312
    • Mitra, P.1    Murthy, C.2    Pal, S.3
  • 27
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive intrusion detection: A data mining approach
    • W. Lee, S. J. Stolfo, and K. W. Mok, "Adaptive intrusion detection: A data mining approach," Artificial Intelligence Review, vol. 14, no. 6, pp. 533-567, 2000.
    • (2000) Artificial Intelligence Review , vol.14 , Issue.6 , pp. 533-567
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 28
    • 85084160262 scopus 로고    scopus 로고
    • Using text categorization techniques for intrusion detection
    • San Francisco, CA, Aug. 5-9
    • Y. Liao and V. R. Vemuri, "Using text categorization techniques for intrusion detection," in 11th USENIX Security Symposium, San Francisco, CA, Aug. 5-9, 2002, pp. 51-59.
    • (2002) 11th USENIX Security Symposium , pp. 51-59
    • Liao, Y.1    Vemuri, V.R.2
  • 30
    • 2942731012 scopus 로고    scopus 로고
    • An extensive empirical study of feature selection metrics for text classification
    • G. Forman, "An extensive empirical study of feature selection metrics for text classification," J. Mach. Learn. Res., vol. 3, pp. 1289-1305, 2003.
    • (2003) J. Mach. Learn. Res , vol.3 , pp. 1289-1305
    • Forman, G.1
  • 31
    • 84902824651 scopus 로고    scopus 로고
    • Scalable analysis techniques for microprocessor performance counter metrics
    • Baltimore, MD, Nov. 16-22
    • D. H. Ahn and J. S. Vetter, "Scalable analysis techniques for microprocessor performance counter metrics," in Proceedings. SuperComputing, Baltimore, MD, Nov. 16-22, 2002, pp. 1-16.
    • (2002) Proceedings. SuperComputing , pp. 1-16
    • Ahn, D.H.1    Vetter, J.S.2
  • 34
    • 21644486205 scopus 로고    scopus 로고
    • Performance analysis in loosely-coupled distributed systems
    • Bertinoro, Italy, Oct
    • R. Isaacs and P. Barham, "Performance analysis in loosely-coupled distributed systems," in 7th CaberNet Radicals Workshop, Bertinoro, Italy, Oct. 2002.
    • (2002) 7th CaberNet Radicals Workshop
    • Isaacs, R.1    Barham, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.