共 7 条
[1]
A tutorial on hidden Markov models and selected ap-plications in speech recognition. Rabiner L R. Proceedings of Tricomm . 1989
[2]
Visual firewall:real-time network security monitor. Lee C P,Trost J,Gibbs N,et al. Visualization for Computer Security VizSEC 2005 . 2005
[3]
Scalable feature selection for large size database. Liu Huan,Setiono R. Proceedings of the Fourth World Congress on Expert Systems . 1998
[4]
A probabilistic approach to feature selection. LIU Huan,Setiono R. Proceedings of Internatinoal Conference on Machine Learning . 1996
[5]
deputy director of De-fense Research&Engineering Deputy Under Secretary of Defense(Science&Technology). Office of The Secretary of Defense(OSD). Small Business Innovation Research(SBIR)FY2005.3Program Description .
[6]
System for Internet Level Knowledge(SIL K). Carnegie Mellon’s SEI. http://silktools.source forge.net . 2005
[7]
A glimpse into the future of id. Bass T,Gruber D. http://www.usenix.org/publications/login/199929/features/future.html . 1999