• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 132
  • 9
  • 9
  • 5
  • 4
  • 4
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 194
  • 70
  • 61
  • 57
  • 57
  • 43
  • 40
  • 40
  • 39
  • 36
  • 36
  • 36
  • 32
  • 28
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Embedding Network Information for Machine Learning-based Intrusion Detection

DeFreeuw, Jonathan Daniel 18 January 2019 (has links)
As computer networks grow and demonstrate more complicated and intricate behaviors, traditional intrusion detections systems have fallen behind in their ability to protect network resources. Machine learning has stepped to the forefront of intrusion detection research due to its potential to predict future behaviors. However, training these systems requires network data such as NetFlow that contains information regarding relationships between hosts, but requires human understanding to extract. Additionally, standard methods of encoding this categorical data struggles to capture similarities between points. To counteract this, we evaluate a method of embedding IP addresses and transport-layer ports into a continuous space, called IP2Vec. We demonstrate this embedding on two separate datasets, CTU'13 and UGR'16, and combine the UGR'16 embedding with several machine learning methods. We compare the models with and without the embedding to evaluate the benefits of including network behavior into an intrusion detection system. We show that the addition of embeddings improve the F1-scores for all models in the multiclassification problem given in the UGR'16 data. / MS / As computer networks grow and demonstrate more complicated and intricate behaviors, traditional network protection tools like firewalls struggle to protect personal computers and servers. Machine learning has stepped to the forefront to counteract this by learning and predicting behavior on a network. However, this learned behavior fails to capture much of the information regarding relationships between computers on a network. Additionally, standard techniques to convert network information into numbers struggles to capture many of the similarities between machines. To counteract this, we evaluate a method to capture relationships between IP addresses and ports, called an embedding. We demonstrate this embedding on two different datasets of network traffic, and evaluate the embedding on one dataset with several machine learning methods. We compare the models with and without the embedding to evaluate the benefits of including network behavior into an intrusion detection system. We show that including network behavior into machine learning models improves the performance of classifying attacks found in the UGR’16 data.
12

Pseudo-Triangulations On Closed Surfaces

Potter, John R 14 February 2008 (has links)
Shifting attention from the plane to the sphere and torus, we extend the study of pseudo-triangulations. Planar representations of each surface are used. A number of theorems and concepts are taken from the plane and applied to the sphere and torus not only for pseudo-triangulations but for triangulations as well. We found the number of edges and faces in a triangulation on n vertices in the plane, on the sphere and on the torus.
13

Embedding theorems and finiteness properties for residuated structures and substructural logics

Hsieh, Ai-Ni. January 2008 (has links)
Paper 1. This paper establishes several algebraic embedding theorems, each of which asserts that a certain kind of residuated structure can be embedded into a richer one. In almost all cases, the original structure has a compatible involution, which must be preserved by the embedding. The results, in conjunction with previous findings, yield separative axiomatizations of the deducibility relations of various substructural formal systems having double negation and contraposition axioms. The separation theorems go somewhat further than earlier ones in the literature, which either treated fewer subsignatures or focussed on the conservation of theorems only. Paper 2. It is proved that the variety of relevant disjunction lattices has the finite embeddability property (FEP). It follows that Avron’s relevance logic RMImin has a strong form of the finite model property, so it has a solvable deducibility problem. This strengthens Avron’s result that RMImin is decidable. Paper 3. An idempotent residuated po-monoid is semiconic if it is a subdirect product of algebras in which the monoid identity t is comparable with all other elements. It is proved that the quasivariety SCIP of all semiconic idempotent commutative residuated po-monoids is locally finite. The lattice-ordered members of this class form a variety SCIL, which is not locally finite, but it is proved that SCIL has the FEP. More generally, for every relative subvariety K of SCIP, the lattice-ordered members of K have the FEP. This gives a unified explanation of the strong finite model property for a range of logical systems. It is also proved that SCIL has continuously many semisimple subvarieties, and that the involutive algebras in SCIL are subdirect products of chains. Paper 4. Anderson and Belnap’s implicational system RMO can be extended conservatively by the usual axioms for fusion and for the Ackermann truth constant t. The resulting system RMO is algebraized by the quasivariety IP of all idempotent commutative residuated po-monoids. Thus, the axiomatic extensions of RMO are in one-to-one correspondence with the relative subvarieties of IP. It is proved here that a relative subvariety of IP consists of semiconic algebras if and only if it satisfies x (x t) x. Since the semiconic algebras in IP are locally finite, it follows that when an axiomatic extension of RMO has ((p t) p) p among its theorems, then it is locally tabular. In particular, such an extension is strongly decidable, provided that it is finitely axiomatized. / Thesis (Ph.D.)-University of KwaZulu-Natal, Westville, 2008.
14

A Constant-Factor Approximation Algorithm for Embedding Unweighted Graphs into Trees

Badoiu, Mihai, Indyk, Piotr, Sidiropoulos, Anastasios 05 July 2004 (has links)
We present a constant-factor approximation algorithm for computing an embedding of the shortest path metric of an unweighted graph into a tree, that minimizes the multiplicative distortion.
15

An end-to-end gluing construction for surfaces of constant mean curvature /

Ratzkin, Jesse. January 2001 (has links)
Thesis (Ph. D.)--University of Washington, 2001. / Vita. Includes bibliographical references (pages 42-44).
16

Embeddings of configurations

Flowers, Garret 29 April 2015 (has links)
In this dissertation, we examine the nature of embeddings with regard to both combinatorial and geometric configurations. A combinatorial [r,k]-configuration is a collection of abstract points and sets (referred to as blocks) such that each point is a member of r blocks, each block is of size k, and these objects satisfy a linearity criterion: no two blocks intersect in more than one point. A geometric configuration requires that the points and blocks be realized as points and lines within the Euclidean plane. We provide improvements on the current bounds for the asymptotic existence of both combinatorial and geometric configurations. In addition, we examine the largely new problem of embedding configurations within larger configurations possessing regularity properties. Additionally, previously undiscovered geometric [r,k]-configurations are found as near-coverings of combinatorial configurations. / Graduate
17

Pseudo-triangulations on closed surfaces

Potter, John R. January 2008 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: Embeddings; graph theory; pseudo-triangulations. Includes bibliographical references (leaves 30-31).
18

A Constant-Factor Approximation Algorithm for Embedding Unweighted Graphs into Trees

Badoiu, Mihai, Indyk, Piotr, Sidiropoulos, Anastasios 05 July 2004 (has links)
We present a constant-factor approximation algorithm for computing anembedding of the shortest path metric of an unweighted graph into atree, that minimizes the multiplicative distortion.
19

Embedding with PageRank

Disha Shur (11892086) 03 May 2022 (has links)
<p> Personalized PageRank with high teleportation probability enables exploring the environment of a seed. With this insight, one can use an orthogonal factorization of a set of personalized PageRank vectors, like SVD, to derive a 2-dimensional representation of the network. This can be done for the whole network or a smaller piece. The power of this method lies in the fact that only a few columns, compared to the size of the networks, can be used to generate a local representation of the part of the network we are interested in. This technique has the potential to be seamlessly used for higher order structures, such as hypergraphs which have found a great deal of use for real-world data. This work investigates the characteristics of personalized PageRank and how it compares to the transition probabilities on the graph in terms of their ability to develop low dimensional representations. A key focus of the thesis are the similarities between the embeddings generated due to PageRank and those generated by spectral methods.</p>
20

The Nash-Moser inverse function theorem and the isometric embedding problem in Riemannian geometry.

January 1984 (has links)
Sung Wing-wah. / Bibliography: leaves 42-45 / Thesis (M.Ph.)--Chinese University of Hong Kong, 1984

Page generated in 0.0405 seconds