Sciweavers

318 search results - page 8 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ICML
1994
IEEE
15 years 1 months ago
Combining Top-down and Bottom-up Techniques in Inductive Logic Programming
This paper describes a new methodfor inducing logic programs from examples which attempts to integrate the best aspects of existingILP methodsintoa singlecoherent framework. In pa...
John M. Zelle, Raymond J. Mooney, Joshua B. Konvis...
JUCS
2006
185views more  JUCS 2006»
14 years 10 months ago
The Berlin Brain-Computer Interface: Machine Learning Based Detection of User Specific Brain States
We outline the Berlin Brain-Computer Interface (BBCI), a system which enables us to translate brain signals from movements or movement intentions into control commands. The main co...
Benjamin Blankertz, Guido Dornhege, Steven Lemm, M...
CSL
2010
Springer
14 years 8 months ago
Voice activity detection based on statistical models and machine learning approaches
The voice activity detectors (VADs) based on statistical models have shown impressive performances especially when fairly precise statistical models are employed. Moreover, the ac...
Jong Won Shin, Joon-Hyuk Chang, Nam Soo Kim
ICPR
2008
IEEE
15 years 11 months ago
A machine learning based scheme for double JPEG compression detection
Double JPEG compression detection is of significance in digital forensics. We propose an effective machine learning based scheme to distinguish between double and single JPEG comp...
Chunhua Chen, Wei Su, Yun Q. Shi
ICML
2008
IEEE
15 years 10 months ago
A worst-case comparison between temporal difference and residual gradient with linear function approximation
Residual gradient (RG) was proposed as an alternative to TD(0) for policy evaluation when function approximation is used, but there exists little formal analysis comparing them ex...
Lihong Li