Sciweavers

318 search results - page 54 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 1 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
IAAI
2003
14 years 11 months ago
CriterionSM Online Essay Evaluation: An Application for Automated Evaluation of Student Essays
This paper describes a deployed educational technology application: the CriterionSM Online Essay Evaluation Service, a web-based system that provides automated scoring and evaluat...
Jill Burstein, Martin Chodorow, Claudia Leacock
BMCBI
2008
153views more  BMCBI 2008»
14 years 10 months ago
Improved general regression network for protein domain boundary prediction
Background: Protein domains present some of the most useful information that can be used to understand protein structure and functions. Recent research on protein domain boundary ...
Paul D. Yoo, Abdur R. Sikder, Bing Bing Zhou, Albe...
LREC
2010
160views Education» more  LREC 2010»
14 years 11 months ago
Construction of Back-Channel Utterance Corpus for Responsive Spoken Dialogue System Development
In spoken dialogues, if a spoken dialogue system does not respond at all during user's utterances, the user might feel uneasy because the user does not know whether or not th...
Yuki Kamiya, Tomohiro Ohno, Shigeki Matsubara, Hid...
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
14 years 11 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...