Sciweavers

318 search results - page 31 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ALT
2007
Springer
15 years 7 months ago
Learning and Verifying Graphs Using Queries with a Focus on Edge Counting
We consider the problem of learning and verifying hidden graphs and their properties given query access to the graphs. We analyze various queries (edge detection, edge counting, sh...
Lev Reyzin, Nikhil Srivastava
ICPR
2008
IEEE
15 years 4 months ago
Signature verification based on fusion of on-line and off-line kernels
The problem of signature verification is considered within the bounds of the kernel-based methodology of pattern recognition, more specifically, SVM principle of machine learning....
Vadim Mottl, Mikhail Lange, Valentina Sulimova, Al...
CEC
2007
IEEE
15 years 4 months ago
Concerning the potential of evolutionary support vector machines
— Within the present paper, we put forward a novel hybridization between support vector machines and evolutionary algorithms. Evolutionary support vector machines consider the cl...
Ruxandra Stoean, Mike Preuss, Catalin Stoean, Dumi...
LREC
2008
193views Education» more  LREC 2008»
14 years 11 months ago
Eksairesis: A Domain-Adaptable System for Ontology Building from Unstructured Text
This paper describes Eksairesis, a system for learning economic domain knowledge automatically from Modern Greek text. The knowledge is in the form of economic terms and the seman...
Katia Kermanidis, Aristomenis Thanopoulos, Manolis...
RAID
2009
Springer
15 years 4 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...