-
1
-
-
80053431219
-
Introduction to Latent Semantic Analysis
-
T. K. Landauer, P. W, Foltz, D. Laham, "Introduction to Latent Semantic Analysis," Discourse Processes, 25, 1998, 259-284.
-
(1998)
Discourse Processes
, vol.25
, pp. 259-284
-
-
Landauer, T.K.1
Foltz, P.W.2
Laham, D.3
-
3
-
-
0001926426
-
Tutoring Systems Based on Latent Semantic Analysis
-
S.P. Lajoie and M. Vivet Eds
-
B. Lemaire, "Tutoring Systems Based on Latent Semantic Analysis," In S.P. Lajoie and M. Vivet (Eds.), Artificial Intelligence in Education, 1999, 527-534.
-
(1999)
Artificial Intelligence in Education
, pp. 527-534
-
-
Lemaire, B.1
-
4
-
-
0033894473
-
Large vocabulary speech recognition with multispan statistical language models
-
J. R. Bellegarda, "Large vocabulary speech recognition with multispan statistical language models," IEEE Transactions on Speech and Audio Processing, 8(1), 2000, 76-84.
-
(2000)
IEEE Transactions on Speech and Audio Processing
, vol.8
, Issue.1
, pp. 76-84
-
-
Bellegarda, J.R.1
-
5
-
-
0000600219
-
A Solution to Plato's Problem: The Latent Semantic Analysis Theory of the Acquisition, Induction, and Representation of Knowledge
-
T. K. Landauer, T. S. Dumais, "A Solution to Plato's Problem: The Latent Semantic Analysis Theory of the Acquisition, Induction, and Representation of Knowledge," Psychological Review, 104, 1997, 211-240.
-
(1997)
Psychological Review
, vol.104
, pp. 211-240
-
-
Landauer, T.K.1
Dumais, T.S.2
-
7
-
-
84989525001
-
Indexing by latent semantic analysis
-
S. Deerwester, T. S. Dumais, T. K. Landauer, G. W. Furnas, R. A. Harshman, "Indexing by latent semantic analysis," JSIS, 41(6), 1990, 391-407.
-
(1990)
JSIS
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, T.S.2
Landauer, T.K.3
Furnas, G.W.4
Harshman, R.A.5
-
8
-
-
29244443366
-
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System
-
S. Rawat, A. Pujari, V. Gulati, "On the Use of Singular Value Decomposition for a Fast Intrusion Detection System," Electrical. Notes Theory Computer Science 142, 2006, 215-228.
-
(2006)
Electrical. Notes Theory Computer Science
, vol.142
, pp. 215-228
-
-
Rawat, S.1
Pujari, A.2
Gulati, V.3
-
9
-
-
0034730140
-
Singular value decomposition for genome-wide expression data processing and modeling
-
O. Alter, P. O. Brown, D. Botstein, "Singular value decomposition for genome-wide expression data processing and modeling," Proceedings of National Academy of Sciences. USA, 97, 2000, 10101-10106.
-
(2000)
Proceedings of National Academy of Sciences. USA
, vol.97
, pp. 10101-10106
-
-
Alter, O.1
Brown, P.O.2
Botstein, D.3
-
10
-
-
33646178879
-
Immunocomputing model of intrusion detection
-
Springer
-
Y. Melnikov, A. Tarakanov, "Immunocomputing model of intrusion detection," LNCS, 2776, Springer, 2003, 453-456.
-
(2003)
LNCS
, vol.2776
, pp. 453-456
-
-
Melnikov, Y.1
Tarakanov, A.2
-
12
-
-
33751582540
-
Multilinear image analysis for facial recognition
-
M. Vasilescu and D. Terzopoulos, "Multilinear image analysis for facial recognition," ICPR, 2002, 511-514.
-
(2002)
ICPR
, pp. 511-514
-
-
Vasilescu, M.1
Terzopoulos, D.2
-
13
-
-
33947265693
-
The Feature Selection and Intrusion Detection Problems
-
th Asian Computing Science Conference, Springer
-
th Asian Computing Science Conference, LNCS, 3321, Springer, 2004, 468-483.
-
(2004)
LNCS
, vol.3321
, pp. 468-483
-
-
Sung, A.H.1
Mukkamala, S.2
-
14
-
-
0004204715
-
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems,
-
Master's Thesis, MIT
-
K. Kendall, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems," Master's Thesis, MIT, 1998.
-
(1998)
-
-
Kendall, K.1
-
15
-
-
0006890005
-
The Development and Analysis of Intrusion Detection Algorithms,
-
SM. Thesis, MIT
-
S. E. Webster, "The Development and Analysis of Intrusion Detection Algorithms," SM. Thesis, MIT, 1998.
-
(1998)
-
-
Webster, S.E.1
-
16
-
-
0000924888
-
Cost-based Modeling and Evaluation for Data Mining with Application, to Fraud and Intrusion Detection
-
J. Stolfo, F. Wei, W. Lee, A. Prodromidis, and P. K. Chan, "Cost-based Modeling and Evaluation for Data Mining with Application, to Fraud and Intrusion Detection," DARPA Information Survivability Conference & Exposition, 1999, 130-144.
-
(1999)
DARPA Information Survivability Conference & Exposition
, pp. 130-144
-
-
Stolfo, J.1
Wei, F.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
17
-
-
33750691647
-
Zoomed Clusters
-
Proceedings of The Thirteen International Conference on Neural Information Processing ICONIP, Springer
-
J. Lassez, T. Karadeniz, and S. Mukkamala , "Zoomed Clusters," Proceedings of The Thirteen International Conference on Neural Information Processing (ICONIP), LNCS, 4233, Springer, 2006, 824-830.
-
(2006)
LNCS
, vol.4233
, pp. 824-830
-
-
Lassez, J.1
Karadeniz, T.2
Mukkamala, S.3
-
18
-
-
15744380176
-
A Framework for Countering Denial of Service Attacks (Knowledge Discovery Approach)
-
Man, and Cybernetics
-
S. Mukkamala, A. H. Sung "A Framework for Countering Denial of Service Attacks (Knowledge Discovery Approach)," Proc. of IEEE International Conference Systems, Man, and Cybernetics, 2004, 3273-3278.
-
(2004)
Proc. of IEEE International Conference Systems
, pp. 3273-3278
-
-
Mukkamala, S.1
Sung, A.H.2
-
19
-
-
3042530277
-
The Nature of Statistical Learning Theory
-
V. N. Vapnik, "The Nature of Statistical Learning Theory," Springer, 1995.
-
(1995)
Springer
-
-
Vapnik, V.N.1
-
21
-
-
56349119316
-
Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection
-
S. Bandyopadhyay, U. Maulik, L. Holder and D. Cook Eds, Springer
-
S. Mukkamala, A. H. Sung, "Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection," Advanced Methods for Knowledge Discovery from Complex Data, S. Bandyopadhyay, U. Maulik, L. Holder and D. Cook (Eds.) Springer, 2005, 285-306.
-
(2005)
Advanced Methods for Knowledge Discovery from Complex Data
, pp. 285-306
-
-
Mukkamala, S.1
Sung, A.H.2
-
22
-
-
0003479517
-
-
Morgan Kaufmann Publishers, Inc
-
W. Banzhaf, P. Nordin, R. E. Keller, and F. D. Francone, "Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and its Applications," Morgan Kaufmann Publishers, Inc, 1998.
-
(1998)
Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and its Applications
-
-
Banzhaf, W.1
Nordin, P.2
Keller, R.E.3
Francone, F.D.4
-
23
-
-
35248827053
-
-
Advances in Intelligent Data Analysis V, 2810, Springer
-
A. E. Bernal, T. Karadeniz, K. Hospevian, J-L. Lassez, "Similarity Based Classification," Advances in Intelligent Data Analysis V, LNCS, 2810, Springer, 2003, 187-197.
-
(2003)
Similarity Based Classification
, vol.LNCS
, pp. 187-197
-
-
Bernal, A.E.1
Karadeniz, T.2
Hospevian, K.3
Lassez, J.-L.4
|