Sciweavers

318 search results - page 16 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
CCS
2008
ACM
15 years 1 days ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...
ICML
2002
IEEE
15 years 11 months ago
On generalization bounds, projection profile, and margin distribution
We study generalization properties of linear learning algorithms and develop a data dependent approach that is used to derive generalization bounds that depend on the margin distr...
Ashutosh Garg, Sariel Har-Peled, Dan Roth
ICALT
2008
IEEE
15 years 4 months ago
Glosser: Enhanced Feedback for Student Writing Tasks
We describe Glosser, a system that supports students in writing essays by 1) scaffolding their reflection with trigger questions, and 2) using text mining techniques to provide co...
Jorge J. Villalón, Paul Kearney, Rafael A. ...
BMCBI
2007
129views more  BMCBI 2007»
14 years 10 months ago
Exploring inconsistencies in genome-wide protein function annotations: a machine learning approach
Background: Incorrectly annotated sequence data are becoming more commonplace as databases increasingly rely on automated techniques for annotation. Hence, there is an urgent need...
Carson M. Andorf, Drena Dobbs, Vasant Honavar
WMCSA
2008
IEEE
15 years 4 months ago
HealthSense: classification of health-related sensor data through user-assisted machine learning
Remote patient monitoring generates much more data than healthcare professionals are able to manually interpret. Automated detection of events of interest is therefore critical so...
Erich P. Stuntebeck, John S. Davis II, Gregory D. ...