Sciweavers

1025 search results - page 205 / 205
» Constraint Programming for Data Mining and Machine Learning
Sort
View
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
13 years 10 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
NIPS
2003
13 years 6 months ago
Max-Margin Markov Networks
In typical classification tasks, we seek a function which assigns a label to a single object. Kernel-based approaches, such as support vector machines (SVMs), which maximize the ...
Benjamin Taskar, Carlos Guestrin, Daphne Koller
BMCBI
2006
140views more  BMCBI 2006»
13 years 5 months ago
SNP-PHAGE - High throughput SNP discovery pipeline
Background: Single nucleotide polymorphisms (SNPs) as defined here are single base sequence changes or short insertion/deletions between or within individuals of a given species. ...
Lakshmi K. Matukumalli, John J. Grefenstette, Davi...
CONEXT
2010
ACM
13 years 3 months ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
CIDR
2003
106views Algorithms» more  CIDR 2003»
13 years 6 months ago
Speculative Query Processing
Speculation is an every day phenomenon whereby one acts in anticipation of particular conditions that are likely to hold in the future. Computer science research has seen many suc...
Neoklis Polyzotis, Yannis E. Ioannidis