Sciweavers

9189 search results - page 1657 / 1838
» Biological data mining
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 11 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
124
Voted
ICTAI
2007
IEEE
15 years 11 months ago
Constructing VEGGIE: Machine Learning for Context-Sensitive Graph Grammars
Context-sensitive graph grammar construction tools have been used to develop and study interesting languages. However, the high dimensionality of graph grammars result in costly e...
Keven Ates, Kang Zhang
142
Voted
DAWAK
2007
Springer
15 years 10 months ago
MOSAIC: A Proximity Graph Approach for Agglomerative Clustering
Representative-based clustering algorithms are quite popular due to their relative high speed and because of their sound theoretical foundation. On the other hand, the clusters the...
Jiyeon Choo, Rachsuda Jiamthapthaksin, Chun-Sheng ...
135
Voted
UM
2007
Springer
15 years 10 months ago
Eliciting Motivation Knowledge from Log Files Towards Motivation Diagnosis for Adaptive Systems
Motivation is well-known for its importance in learning and its influence on cognitive processes. Adaptive systems would greatly benefit from having a user model of the learner’s...
Mihaela Cocea, Stephan Weibelzahl
160
Voted
ACSC
2006
IEEE
15 years 10 months ago
Unsupervised band removal leading to improved classification accuracy of hyperspectral images
Remotely-sensed images of the earth’s surface are used across a wide range of industries and applications including agriculture, mining, defence, geography and geology, to name ...
R. Ian Faulconbridge, Mark R. Pickering, Michael J...
« Prev « First page 1657 / 1838 Last » Next »