Sciweavers

ML
2010
ACM
142views Machine Learning» more  ML 2010»
13 years 3 months ago
Graph regularization methods for Web spam detection
We present an algorithm, witch, that learns to detect spam hosts or pages on the Web. Unlike most other approaches, it simultaneously exploits the structure of the Web graph as wel...
Jacob Abernethy, Olivier Chapelle, Carlos Castillo
ML
2010
ACM
126views Machine Learning» more  ML 2010»
13 years 3 months ago
The security of machine learning
Marco Barreno, Blaine Nelson, Anthony D. Joseph, J...
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 3 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
ML
2010
ACM
127views Machine Learning» more  ML 2010»
13 years 3 months ago
Stability and model selection in k-means clustering
Abstract Clustering Stability methods are a family of widely used model selection techniques for data clustering. Their unifying theme is that an appropriate model should result in...
Ohad Shamir, Naftali Tishby
ML
2010
ACM
115views Machine Learning» more  ML 2010»
13 years 3 months ago
Preference-based learning to rank
Nir Ailon, Mehryar Mohri
ML
2010
ACM
159views Machine Learning» more  ML 2010»
13 years 3 months ago
Algorithms for optimal dyadic decision trees
Abstract A dynamic programming algorithm for constructing optimal dyadic decision trees was recently introduced, analyzed, and shown to be very effective for low dimensional data ...
Don R. Hush, Reid B. Porter
ML
2010
ACM
125views Machine Learning» more  ML 2010»
13 years 3 months ago
A process for predicting manhole events in Manhattan
Cynthia Rudin, Rebecca J. Passonneau, Axinia Radev...
ML
2010
ACM
13 years 3 months ago
Temporal kernel CCA and its application in multimodal neuronal data analysis
Felix Bießmann, Frank C. Meinecke, Arthur Gr...
ML
2010
ACM
181views Machine Learning» more  ML 2010»
13 years 3 months ago
Decomposing the tensor kernel support vector machine for neuroscience data with structured labels
Abstract The tensor kernel has been used across the machine learning literature for a number of purposes and applications, due to its ability to incorporate samples from multiple s...
David R. Hardoon, John Shawe-Taylor
ML
2010
ACM
142views Machine Learning» more  ML 2010»
13 years 3 months ago
Fast adaptive algorithms for abrupt change detection
We propose two fast algorithms for abrupt change detection in streaming data that can operate on arbitrary unknown data distributions before and after the change. The first algor...
Daniel Nikovski, Ankur Jain