Sciweavers

1614 search results - page 256 / 323
» Learning Rules and Their Exceptions
Sort
View
WWW
2008
ACM
15 years 10 months ago
Improving web spam detection with re-extracted features
Web spam detection has become one of the top challenges for the Internet search industry. Instead of using some heuristic rules, we propose a feature re-extraction strategy to opt...
Guanggang Geng, Chunheng Wang, Qiudan Li
VLDB
2008
ACM
147views Database» more  VLDB 2008»
15 years 10 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
CICLING
2009
Springer
15 years 4 months ago
The Value of Weights in Automatically Generated Text Structures
Abstract. One question that arises if we want to evolve generation techniques to accommodate Web ontologies is how to capture and expose the relevant ontology content to the user. ...
Dana Dannélls
ICDAR
2009
IEEE
15 years 4 months ago
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm
We have proposed a complete system for text detection and localization in gray scale scene images. A boosting framework integrating feature and weak classifier selection based on...
Shehzad Muhammad Hanif, Lionel Prevost
PKDD
2009
Springer
118views Data Mining» more  PKDD 2009»
15 years 4 months ago
Sparse Kernel SVMs via Cutting-Plane Training
We explore an algorithm for training SVMs with Kernels that can represent the learned rule using arbitrary basis vectors, not just the support vectors (SVs) from the training set. ...
Thorsten Joachims, Chun-Nam John Yu