Sciweavers

4085 search results - page 364 / 817
» Benchmarking Data Mining Algorithms
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 5 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
SAC
2004
ACM
15 years 10 months ago
Knowledge discovery from doctor-patient relationship
The relationship between doctors and their patients is gaining more and more importance in the health care providing. It determines the compliance of the treatment and a part of t...
Jesús S. Aguilar-Ruiz, Raquel Costa, Federi...
GFKL
2006
Springer
75views Data Mining» more  GFKL 2006»
15 years 8 months ago
Classification of Contradiction Patterns
Abstract. Solving conflicts between overlapping databases requires an understanding of the reasons that lead to the inconsistencies. Provided that conflicts do not occur randomly b...
Heiko Müller, Ulf Leser, Johann Christoph Fre...
KDD
2001
ACM
181views Data Mining» more  KDD 2001»
16 years 5 months ago
Co-clustering documents and words using bipartite spectral graph partitioning
Both document clustering and word clustering are well studied problems. Most existing algorithms cluster documents and words separately but not simultaneously. In this paper we pr...
Inderjit S. Dhillon
PKDD
2009
Springer
181views Data Mining» more  PKDD 2009»
15 years 11 months ago
Active Learning for Reward Estimation in Inverse Reinforcement Learning
Abstract. Inverse reinforcement learning addresses the general problem of recovering a reward function from samples of a policy provided by an expert/demonstrator. In this paper, w...
Manuel Lopes, Francisco S. Melo, Luis Montesano