Sciweavers

540 search results - page 94 / 108
» Dimensionality Reduction for Data in Multiple Feature Repres...
Sort
View
CIA
2008
Springer
15 years 1 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
84
Voted
ICDM
2005
IEEE
143views Data Mining» more  ICDM 2005»
15 years 5 months ago
Effective Estimation of Posterior Probabilities: Explaining the Accuracy of Randomized Decision Tree Approaches
There has been increasing number of independently proposed randomization methods in different stages of decision tree construction to build multiple trees. Randomized decision tre...
Wei Fan, Ed Greengrass, Joe McCloskey, Philip S. Y...
126
Voted
CVPR
2009
IEEE
16 years 6 months ago
Boosted Multi-Task Learning for Face Verification With Applications to Web Image and Video Search
Face verification has many potential applications including filtering and ranking image/video search results on celebrities. Since these images/videos are taken under uncontrolle...
Xiaogang Wang (MIT), Cha Zhang (Microsoft Research...
SDM
2010
SIAM
226views Data Mining» more  SDM 2010»
15 years 1 months ago
Two-View Transductive Support Vector Machines
Obtaining high-quality and up-to-date labeled data can be difficult in many real-world machine learning applications, especially for Internet classification tasks like review spam...
Guangxia Li, Steven C. H. Hoi, Kuiyu Chang
ICDIM
2007
IEEE
15 years 6 months ago
Remote instrument control with CIMA Web services and Web 2.0 technology
—The Common Instrument Middleware Architecture (CIMA) model for Web services based monitoring of remote scientific instruments is being extended and enhanced to provide a capabil...
Douglas du Boulay, Clinton Chee, Kenneth Chiu, Ric...