Author of the publication

On the Accuracy of Meta-Learning for Scalable Data Mining.

, and . J. Intell. Inf. Syst., 8 (1): 5-28 (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database Research at Columbia University., , , , and . SIGMOD Record, 27 (3): 75-80 (1998)Concurrency Attacks., , , and . HotPar, USENIX Association, (2012)Software decoys for insider threat., and . AsiaCCS, page 93-94. ACM, (2012)On the infeasibility of modeling polymorphic shellcode., , , , and . ACM Conference on Computer and Communications Security, page 541-551. ACM, (2007)Model Aggregation for Distributed Content Anomaly Detection., , and . AISec@CCS, page 61-71. ACM, (2014)Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes., , , and . AISec, page 39-46. ACM, (2009)Active authentication using file system decoys and user behavior modeling: results of a large scale study., , , , and . Comput. Secur., (2019)Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection., and . KDD, page 164-168. AAAI Press, (1998)Sharing Learned Models among Remote Database Partitions by Local Meta-Learning., and . KDD, page 2-7. AAAI Press, (1996)The SPARCHS Project: Hardware Support for Software Security., , , , and . SysSec@DIMVA, page 119-122. IEEE, (2011)