Sciweavers

7378 search results - page 1390 / 1476
» Introduction to Machine Learning
Sort
View
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 4 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
JMLR
2010
145views more  JMLR 2010»
14 years 4 months ago
Parallelizable Sampling of Markov Random Fields
Markov Random Fields (MRFs) are an important class of probabilistic models which are used for density estimation, classification, denoising, and for constructing Deep Belief Netwo...
James Martens, Ilya Sutskever
JMLR
2010
161views more  JMLR 2010»
14 years 4 months ago
Accuracy-Rejection Curves (ARCs) for Comparing Classification Methods with a Reject Option
Data extracted from microarrays are now considered an important source of knowledge about various diseases. Several studies based on microarray data and the use of receiver operat...
Malik Sajjad Ahmed Nadeem, Jean-Daniel Zucker, Bla...
JMLR
2010
145views more  JMLR 2010»
14 years 4 months ago
Event based text mining for integrated network construction
The scientific literature is a rich and challenging data source for research in systems biology, providing numerous interactions between biological entities. Text mining technique...
Yvan Saeys, Sofie Van Landeghem, Yves Van de Peer
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
« Prev « First page 1390 / 1476 Last » Next »