Sciweavers

9886 search results - page 1713 / 1978
» Learning Compressible Models
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 5 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
KDD
2004
ACM
154views Data Mining» more  KDD 2004»
16 years 5 months ago
Diagnosing extrapolation: tree-based density estimation
There has historically been very little concern with extrapolation in Machine Learning, yet extrapolation can be critical to diagnose. Predictor functions are almost always learne...
Giles Hooker
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 5 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
MICRO
2007
IEEE
135views Hardware» more  MICRO 2007»
15 years 11 months ago
Microarchitectural Design Space Exploration Using an Architecture-Centric Approach
The microarchitectural design space of a new processor is too large for an architect to evaluate in its entirety. Even with the use of statistical simulation, evaluation of a sing...
Christophe Dubach, Timothy M. Jones, Michael F. P....
CIVR
2007
Springer
166views Image Analysis» more  CIVR 2007»
15 years 11 months ago
Multi-level local descriptor quantization for bag-of-visterms image representation
In the past, quantized local descriptors have been shown to be a good base for the representation of images, that can be applied to a wide range of tasks. However, current approac...
Pedro Quelhas, Jean-Marc Odobez
« Prev « First page 1713 / 1978 Last » Next »