Sciweavers

318 search results - page 36 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ACIVS
2006
Springer
15 years 1 months ago
Robust Analysis of Silhouettes by Morphological Size Distributions
We address the topic of real-time analysis and recognition of silhouettes. The method that we propose first produces object features obtained by a new type of morphological operato...
Olivier Barnich, Sébastien Jodogne, Marc Va...
TKDE
2008
123views more  TKDE 2008»
14 years 10 months ago
Explaining Classifications For Individual Instances
We present a method for explaining predictions for individual instances. The presented approach is general and can be used with all classification models that output probabilities...
Marko Robnik-Sikonja, Igor Kononenko
WCE
2007
14 years 11 months ago
Gene Selection for Tumor Classification Using Microarray Gene Expression Data
– In this paper we perform a t-test for significant gene expression analysis in different dimensions based on molecular profiles from microarray data, and compare several computa...
Krishna Yendrapalli, Ram B. Basnet, Srinivas Mukka...
KDD
2003
ACM
214views Data Mining» more  KDD 2003»
15 years 10 months ago
Adaptive duplicate detection using learnable string similarity measures
The problem of identifying approximately duplicate records in databases is an essential step for data cleaning and data integration processes. Most existing approaches have relied...
Mikhail Bilenko, Raymond J. Mooney
ECCV
2006
Springer
16 years 17 hour ago
A Boundary-Fragment-Model for Object Detection
The objective of this work is the detection of object classes, such as airplanes or horses. Instead of using a model based on salient image fragments, we show that object class det...
Andreas Opelt, Axel Pinz, Andrew Zisserman