Sciweavers

2180 search results - page 384 / 436
» Algorithms for discovering bucket orders from data
Sort
View
SDM
2011
SIAM
232views Data Mining» more  SDM 2011»
14 years 3 months ago
A Sequential Dual Method for Structural SVMs
In many real world prediction problems the output is a structured object like a sequence or a tree or a graph. Such problems range from natural language processing to computationa...
Shirish Krishnaj Shevade, Balamurugan P., S. Sunda...
90
Voted
ICIP
2008
IEEE
16 years 2 months ago
Automatic liver tumor diagnosis with Dynamic-Contrast Enhanced MRI
Dynamic-Contrast Enhanced MRI (DCE-MRI) is currently used as a complementary diagnosis tool to assess the malignancy of the liver tumor, called hepatoma, hepatocarcinoma, hepatoce...
Liliana Caldeira, Isabela Silva, João Sanch...
SDM
2009
SIAM
157views Data Mining» more  SDM 2009»
15 years 9 months ago
MUSK: Uniform Sampling of k Maximal Patterns.
Recent research in frequent pattern mining (FPM) has shifted from obtaining the complete set of frequent patterns to generating only a representative (summary) subset of frequent ...
Mohammad Al Hasan, Mohammed Javeed Zaki
ICCV
2011
IEEE
14 years 18 days ago
The Power of Comparative Reasoning
Rank correlation measures are known for their resilience to perturbations in numeric values and are widely used in many evaluation metrics. Such ordinal measures have rarely been ...
Jay Yagnik, Dennis Strelow, David Ross, Ruei-sung ...
116
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 29 days ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan