Sciweavers

318 search results - page 13 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
FOCS
2005
IEEE
15 years 3 months ago
Mechanism Design via Machine Learning
We use techniques from sample-complexity in machine learning to reduce problems of incentive-compatible mechanism design to standard algorithmic questions, for a wide variety of r...
Maria-Florina Balcan, Avrim Blum, Jason D. Hartlin...
MLDM
2005
Springer
15 years 3 months ago
Activity and Motion Detection Based on Measuring Texture Change
We estimate the speed of texture change by measuring the spread of texture vectors in their feature space. This method allows us to robustly detect even very slow moving objects. B...
Longin Jan Latecki, Roland Miezianko, Dragoljub Po...
ISOLA
2007
Springer
15 years 4 months ago
Using Invariant Detection Mechanism in Black Box Inference
The testing and formal verification of black box software components is a challenging domain. The problem is even harder when specifications of these components are not available...
Muzammil Shahbaz, Roland Groz
BMCBI
2010
176views more  BMCBI 2010»
14 years 10 months ago
TargetSpy: a supervised machine learning approach for microRNA target prediction
Background: Virtually all currently available microRNA target site prediction algorithms require the presence of a (conserved) seed match to the 5' end of the microRNA. Recen...
Martin Sturm, Michael Hackenberg, David Langenberg...
LCTRTS
2007
Springer
15 years 4 months ago
Integrated CPU and l2 cache voltage scaling using machine learning
Embedded systems serve an emerging and diverse set of applications. As a result, more computational and storage capabilities are added to accommodate ever more demanding applicati...
Nevine AbouGhazaleh, Alexandre Ferreira, Cosmin Ru...