Sciweavers

318 search results - page 20 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
IPMI
2009
Springer
15 years 11 months ago
Marginal Space Learning for Efficient Detection of 2D/3D Anatomical Structures in Medical Images
Recently, marginal space learning (MSL) was proposed as a generic approach for automatic detection of 3D anatomical structures in many medical imaging modalities [1]. To accurately...
Yefeng Zheng, Bogdan Georgescu, Dorin Comaniciu
RSCTC
2000
Springer
185views Fuzzy Logic» more  RSCTC 2000»
15 years 1 months ago
A Comparison of Several Approaches to Missing Attribute Values in Data Mining
: In the paper nine different approaches to missing attribute values are presented and compared. Ten input data files were used to investigate the performance of the nine methods t...
Jerzy W. Grzymala-Busse, Ming Hu
ICTAI
2005
IEEE
15 years 3 months ago
ACE: An Aggressive Classifier Ensemble with Error Detection, Correction, and Cleansing
Learning from noisy data is a challenging and reality issue for real-world data mining applications. Common practices include data cleansing, error detection and classifier ensemb...
Yan Zhang, Xingquan Zhu, Xindong Wu, Jeffrey P. Bo...
BMCBI
2004
140views more  BMCBI 2004»
14 years 10 months ago
What can we learn from noncoding regions of similarity between genomes?
Background: In addition to known protein-coding genes, large amounts of apparently non-coding sequence are conserved between the human and mouse genomes. It seems reasonable to as...
Thomas A. Down, Tim J. P. Hubbard