Sciweavers

1025 search results - page 153 / 205
» Constraint Programming for Data Mining and Machine Learning
Sort
View
ICDM
2007
IEEE
109views Data Mining» more  ICDM 2007»
15 years 8 months ago
A Support Vector Approach to Censored Targets
Censored targets, such as the time to events in survival analysis, can generally be represented by intervals on the real line. In this paper, we propose a novel support vector tec...
Pannagadatta K. Shivaswamy, Wei Chu, Martin Jansch...
PC
1998
153views Management» more  PC 1998»
15 years 1 months ago
Compilation Techniques for Out-of-Core Parallel Computations
The difficulty of handling out-of-core data limits the performance of supercomputers as well as the potential of the parallel machines. Since writing an efficient out-of-core ve...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
JMLR
2006
132views more  JMLR 2006»
15 years 1 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
BMCBI
2006
127views more  BMCBI 2006»
15 years 2 months ago
Automatic discovery of cross-family sequence features associated with protein function
Background: Methods for predicting protein function directly from amino acid sequences are useful tools in the study of uncharacterised protein families and in comparative genomic...
Markus Brameier, Josien Haan, Andrea Krings, Rober...
ICMCS
2010
IEEE
198views Multimedia» more  ICMCS 2010»
15 years 3 months ago
Naming persons in news video with label propagation
Labeling persons appearing in video frames with names detected from the video transcript helps improving the video content identification and search task. We develop a face naming...
Phi The Pham, Marie-Francine Moens, Tinne Tuytelaa...