Sciweavers

318 search results - page 34 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
INTERSPEECH
2010
14 years 5 months ago
Coping imbalanced prosodic unit boundary detection with linguistically-motivated prosodic features
Continuous speech input for ASR processing is usually presegmented into speech stretches by pauses. In this paper, we propose that smaller, prosodically defined units can be ident...
Yi-Fen Liu, Shu-Chuan Tseng, Jyh-Shing Roger Jang,...
91
Voted
SAC
2005
ACM
15 years 3 months ago
Learning decision trees from dynamic data streams
: This paper presents a system for induction of forest of functional trees from data streams able to detect concept drift. The Ultra Fast Forest of Trees (UFFT) is an incremental a...
João Gama, Pedro Medas, Pedro Pereira Rodri...
FUIN
2011
358views Cryptology» more  FUIN 2011»
14 years 1 months ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
GECCO
2007
Springer
194views Optimization» more  GECCO 2007»
15 years 4 months ago
Hybrid coevolutionary algorithms vs. SVM algorithms
As a learning method support vector machine is regarded as one of the best classifiers with a strong mathematical foundation. On the other hand, evolutionary computational techniq...
Rui Li, Bir Bhanu, Krzysztof Krawiec
93
Voted
CEAS
2011
Springer
13 years 10 months ago
Spam detection using web page content: a new battleground
Traditional content-based e-mail spam filtering takes into account content of e-mail messages and apply machine learning techniques to infer patterns that discriminate spams from...
Marco Túlio Ribeiro, Pedro Henrique Calais ...