Sciweavers

2884 search results - page 182 / 577
» Evaluating learning algorithms and classifiers
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
LREC
2008
110views Education» more  LREC 2008»
15 years 5 months ago
Cost-Sensitive Learning in Answer Extraction
One problem of data-driven answer extraction in open-domain factoid question answering is that the class distribution of labeled training data is fairly imbalanced. This imbalance...
Michael Wiegand, Jochen L. Leidner, Dietrich Klako...
ECCV
2010
Springer
15 years 5 months ago
Object of Interest Detection by Saliency Learning
In this paper, we present a method for object of interest detection. This method is statistical in nature and hinges in a model which combines salient features using a mixture of l...
ML
2002
ACM
123views Machine Learning» more  ML 2002»
15 years 4 months ago
Feature Generation Using General Constructor Functions
Most classification algorithms receive as input a set of attributes of the classified objects. In many cases, however, the supplied set of attributes is not sufficient for creatin...
Shaul Markovitch, Dan Rosenstein
FLAIRS
2007
15 years 6 months ago
A Distance-Based Over-Sampling Method for Learning from Imbalanced Data Sets
Many real-world domains present the problem of imbalanced data sets, where examples of one classes significantly outnumber examples of other classes. This makes learning difficu...
Jorge de la Calleja, Olac Fuentes