Sciweavers

1025 search results - page 156 / 205
» Constraint Programming for Data Mining and Machine Learning
Sort
View
GFKL
2007
Springer
152views Data Mining» more  GFKL 2007»
15 years 8 months ago
Supporting Web-based Address Extraction with Unsupervised Tagging
Abstract. The manual acquisition and modeling of tourist information as e.g. addresses of points of interest is time and, therefore, cost intensive. Furthermore, the encoded inform...
Berenike Loos, Chris Biemann
IDEAL
2009
Springer
15 years 8 months ago
STORM - A Novel Information Fusion and Cluster Interpretation Technique
Abstract. Analysis of data without labels is commonly subject to scrutiny by unsupervised machine learning techniques. Such techniques provide more meaningful representations, usef...
Jan Feyereisl, Uwe Aickelin
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 2 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
KDD
2009
ACM
175views Data Mining» more  KDD 2009»
15 years 6 months ago
Multi-class protein fold recognition using large margin logic based divide and conquer learning
Inductive Logic Programming (ILP) systems have been successfully applied to solve complex problems in bioinformatics by viewing them as binary classification tasks. It remains an...
Huma Lodhi, Stephen Muggleton, Michael J. E. Stern...
CP
2009
Springer
16 years 2 months ago
Search Spaces for Min-Perturbation Repair
Many problems require minimally perturbing an initial state in order to repair some violated constraints. We consider two search spaces for exactly solving this minimal perturbatio...
Alex S. Fukunaga