Sciweavers

1765 search results - page 167 / 353
» Combinations of Weak Classifiers
Sort
View
IAT
2008
IEEE
15 years 10 months ago
A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters
By feeding personal e-mails into the training set, personalized content-based spam filters are believed to classify e-mails in higher accuracy. However, filters trained by both sp...
Wei-Lun Teng, Wei-Chung Teng
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICDM
2007
IEEE
206views Data Mining» more  ICDM 2007»
15 years 10 months ago
A Novel Rule Weighting Approach in Classification Association Rule Mining
Classification Association Rule Mining (CARM) is a recent Classification Rule Mining (CRM) approach that builds an Association Rule Mining (ARM) based classifier using Classificat...
Yanbo J. Wang, Qin Xin, Frans Coenen
ICIAR
2005
Springer
15 years 9 months ago
On the Individuality of the Iris Biometric
We consider quantitatively establishing the discriminative power of iris biometric data. It is difficult, however, to establish that any biometric modality is capable of distingui...
Sungsoo Yoon, Seung-Seok Choi, Sung-Hyuk Cha, Yill...
ICDAR
2003
IEEE
15 years 9 months ago
Writer Identification from Gray Level Distribution
When identifying a writer from a handwritten text, most often, either some characteristic patterns or some shape parameters are extracted. They are assumed to be specific of the w...
M. Wirotius, Audrey Seropian, Nicole Vincent