Sciweavers

2597 search results - page 471 / 520
» Learning Sunspot Classification
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICIP
2007
IEEE
15 years 4 months ago
Weighted Co-SVM for Image Retrieval with MVB Strategy
In relevance feedback, active learning is often used to alleviate the burden of labeling by selecting only the most informative data. Traditional data selection strategies often c...
Xiaoyu Zhang, Jian Cheng, Hanqing Lu, Songde Ma
ICMCS
2007
IEEE
155views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Hidden Maximum Entropy Approach for Visual Concept Modeling
Recently, the bag-of-words approach has been successfully applied to automatic image annotation, object recognition, etc. The method needs to first quantize an image using the vis...
Sheng Gao, Joo-Hwee Lim, Qibin Sun
BIBE
2007
IEEE
124views Bioinformatics» more  BIBE 2007»
15 years 4 months ago
Finding Cancer-Related Gene Combinations Using a Molecular Evolutionary Algorithm
—High-throughput data such as microarrays make it possible to investigate the molecular-level mechanism of cancer more efficiently. Computational methods boost the microarray ana...
Chan-Hoon Park, Soo-Jin Kim, Sun Kim, Dong-Yeon Ch...
AUSAI
2007
Springer
15 years 4 months ago
Automated Intelligent Abundance Analysis of Scallop Survey Video Footage
Underwater video is increasingly being pursued as a low impact alternative to traditional techniques (such as trawls and dredges) for determining abundance and size frequency of ta...
Rob Fearn, Raymond Williams, R. Mike Cameron-Jones...