Information Technology Reference
In-Depth Information
18. Abdullah, K., Lee, C., Conti, G., Copeland, J.A.: Visualizing Network Data for Intrusion
Detection. In: Sixth Annual IEEE Information Assurance Workshop - Systems, Man and
Cybernetics, pp. 100-108 (2005)
19. Sharkey, A.J.C., Sharkey, N.E.: Combining Diverse Neural Nets. Knowledge Engineering
Review 12(3), 231-247 (1997)
20. Polikar, R.: Ensemble Based Systems in Decision Making. IEEE Circuits and Systems
Magazine 6(3), 21-45 (2006)
21. Ruta, D., Gabrys, B.: An Overview of Classifier Fusion Methods. Computing and Informa-
tion Systems 7(1), 1-10 (2000)
22. Bailey, T., Jain, A.: A Note on Distance-Weighted k-Nearest Neighbor Rules. IEEE Trans-
actions on Systems, Man and Cybernetics 8(4), 311-313 (1978)
23. Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression
Trees, p. 358. Wadsworth Inc., Belmont (1984)
24. Zhao, Y., Zhang, Y.: Comparison of Decision Tree Methods for Finding Active Objects.
Advances in Space Research 41(12), 1955-1959 (2008)
25. Moody, J., Darken, C.J.: Fast Learning in Networks of Locally-tuned Processing Units.
Neural Computation 1(2), 281-294 (1989)
26. Allwein, E.L., Schapire, R.E., Singer, Y.: Reducing Multiclass to Binary: a Unifying Ap-
proach for Margin Classifiers. Journal of Machine Learning Research 1, 113-141 (2001)
27. Breiman, L.: Bagging Predictors. Machine Learning 24(2), 123-140 (1996)
28. Freund, Y., Schapire, R.E.: Experiments with a New Boosting Algorithm. In: International
Conference on Machine Learning, pp. 148-156 (1996)
29. Breiman, L.: Random Forests. Machine Learning 45(1), 5-32 (2001)
30. Friedman, J., Hastie, T., Tibshirani, R.: Additive Logistic Regression: a Statistical View of
Boosting. The Annals of Statistics 28(2), 337-407 (2000)
31. Seewald, A.K.: How to Make Stacking Better and Faster While Also Taking Care of an
Unknown Weakness. In: Nineteenth International Conference on Machine Learning. Mor-
gan Kaufmann Publishers Inc., San Francisco (2002)
32. Corchado, E., Herrero, Á., Sáiz, J.M.: Detecting Compounded Anomalous SNMP Situa-
tions Using Cooperative Unsupervised Pattern Recognition. In: Duch, W., Kacprzyk, J.,
Oja, E., Zadrożny, S. (eds.) ICANN 2005. LNCS, vol. 3697, pp. 905-910. Springer, Hei-
delberg (2005)
33. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA
Data Mining Software: An Update. ACM SIGKDD Explorations Newsletter 11(1), 10-18
(2009)
 
Search WWH ::




Custom Search