Sciweavers

SBIA
2000
Springer
13 years 8 months ago
An Environment for Rule Extraction and Evaluation from Databases
Abstract Classi
José Augusto Baranauskas, Maria Carolina Mo...
RAID
2000
Springer
13 years 8 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
ECAI
2006
Springer
13 years 8 months ago
Efficient Knowledge Acquisition for Extracting Temporal Relations
Abstract. Machine learning approaches in natural language processing often require a large annotated corpus. We present a complementary approach that utilizes expert knowledge to o...
Son Bao Pham, Achim G. Hoffmann
CCS
2006
ACM
13 years 8 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
AUSAI
2006
Springer
13 years 8 months ago
Beyond Accuracy, F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation
Different evaluation measures assess different characteristics of machine learning algorithms. The empirical evaluation of algorithms and classifiers is a matter of on-going debat...
Marina Sokolova, Nathalie Japkowicz, Stan Szpakowi...
EVOW
2007
Springer
13 years 8 months ago
Classification of Cell Fates with Support Vector Machine Learning
In human mesenchymal stem cells the envelope surrounding the nucleus, as visualized by the nuclear lamina, has a round and flat shape. The lamina structure is considerably deformed...
Ofer M. Shir, Vered Raz, Roeland W. Dirks, Thomas ...
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
13 years 8 months ago
Overlapping experiment infrastructure: more, better, faster experimentation
At Google, experimentation is practically a mantra; we evaluate almost every change that potentially affects what our users experience. Such changes include not only obvious user-...
Diane Tang, Ashish Agarwal, Deirdre O'Brien, Mike ...
KDD
1999
ACM
152views Data Mining» more  KDD 1999»
13 years 8 months ago
Applying General Bayesian Techniques to Improve TAN Induction
Tree Augmented Naive Bayes (TAN) has shown to be competitive with state-of-the-art machine learning algorithms [3]. However, the TAN induction algorithm that appears in [3] can be...
Jesús Cerquides
ICANN
2009
Springer
13 years 9 months ago
Constrained Learning Vector Quantization or Relaxed k-Separability
Neural networks and other sophisticated machine learning algorithms frequently miss simple solutions that can be discovered by a more constrained learning methods. Transition from ...
Marek Grochowski, Wlodzislaw Duch
GIS
2009
ACM
13 years 9 months ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson