搜索资源列表
c45_20090628
- c4.5 unix version-c4.5 unix version.........
HTTP-TUNNEL-DETECTING-TECHNIQUE
- 研究了恶意软件常采用的通信方式———隧道技术,并提出了一种基于C4.5的HTTP 隧道检测算法。该算法采用决策支持树算法 C4.5提取网络流特征字段,根据特征字段生成训练数据建立HTTP隧道分类的决策树检测模型,采用该分类模型检测HTTP隧道流,为检测恶意软件提供依据。-Malicious software often used means of communication--- tunneling technology, and a HTTP based on C4.5 Tunne
10-da--suanfa
- 讲述了最著名的十大数据挖掘算法,经典资料,国际权威的学术组织the IEEE International Conference on Data Mining (ICDM) 2006年12月评选出了数据挖掘领域的十大经典算法:C4.5, k-Means, SVM, Apriori, EM, PageRank, AdaBoost, kNN, Naive Bayes, and CART.-About the top ten most famous data mining algorithms, the
Analysis-of-C4.5-Algorithm
- Application and Analysis of C4.5 Algorithm
C4.5
- 这是介绍c4.5算法的一篇文章,非常清楚-It is an article about c4.5 algorithm,which is quite clear.
C4_5Classifier
- c4.5 clasifier for the classification of the vedios.
10.1.1.1.8430
- NeC4.5: Neural Ensemble Based C4.5 Zhi-Hua Zhou, Member, IEEE, and Yuan Jiang Abstract—Decision tree is with good comprehensibility while neural network ensemble is with strong generalization ability.
adaboost
- Now, you ought to implement the AdaBoost.M1 and AdaBoost.M2 algorithms. These algorithms are two versions of the AdaBoost algorithm for handling the Problems with more than two classes. You must first read the paper “Experiments with a New Boosti