A Comparison of the Bagging and the Boosting Methods Using the Decision Trees Classifiers
Kristína Machová, Miroslav Puszta, František Barčák, Peter Bednár (2006)
Computer Science and Information Systems
Similarity:
Kristína Machová, Miroslav Puszta, František Barčák, Peter Bednár (2006)
Computer Science and Information Systems
Similarity:
Michał Woźniak, Bartosz Krawczyk (2012)
International Journal of Applied Mathematics and Computer Science
Similarity:
This paper presents a significant modification to the AdaSS (Adaptive Splitting and Selection) algorithm, which was developed several years ago. The method is based on the simultaneous partitioning of the feature space and an assignment of a compound classifier to each of the subsets. The original version of the algorithm uses a classifier committee and a majority voting rule to arrive at a decision. The proposed modification replaces the fairly simple fusion method with a combined classifier,...
Sergeja Vogrinčič, Zoran Bosnić (2011)
Computer Science and Information Systems
Similarity:
Jasmina Novaković, Perica Strbac, Dusan Bulatović (2011)
The Yugoslav Journal of Operations Research
Similarity:
Koychev, Ivan (2007)
Serdica Journal of Computing
Similarity:
This paper addresses the task of learning classifiers from streams of labelled data. In this case we can face the problem that the underlying concepts can change over time. The paper studies two mechanisms developed for dealing with changing concepts. Both are based on the time window idea. The first one forgets gradually, by assigning to the examples weight that gradually decreases over time. The second one uses a statistical test to detect changes in concept and then optimizes the...
Jecheva, Veselina, Nikolova, Evgeniya (2009)
Serdica Journal of Computing
Similarity:
Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system. This paper examines the anomaly-based intrusion detection based on sequences of system calls. The point is to construct a model that describes normal or acceptable system activity using the classification trees approach. The created database is utilized as a basis...
Marcin Gorawski, Tadeusz Morzy, Robert Wrembel (2009)
Control and Cybernetics
Similarity:
Marek Zaremba (2010)
Control and Cybernetics
Similarity:
Przemysław Grudziński, Marek Wojciechowski (2009)
Control and Cybernetics
Similarity:
Liming Yuan, Jiafeng Liu, Xianglong Tang (2014)
International Journal of Applied Mathematics and Computer Science
Similarity: