Sciweavers

880 search results - page 139 / 176
» Looking at data
Sort
View
TON
2012
13 years 6 days ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
ACL
2012
13 years 6 days ago
Learning to Temporally Order Medical Events in Clinical Text
We investigate the problem of ordering medical events in unstructured clinical narratives by learning to rank them based on their time of occurrence. We represent each medical eve...
Preethi Raghavan, Albert M. Lai, Eric Fosler-Lussi...
WWW
2009
ACM
15 years 10 months ago
Latent space domain transfer between high dimensional overlapping distributions
Transferring knowledge from one domain to another is challenging due to a number of reasons. Since both conditional and marginal distribution of the training data and test data ar...
Sihong Xie, Wei Fan, Jing Peng, Olivier Verscheure...
KDD
2002
ACM
106views Data Mining» more  KDD 2002»
15 years 10 months ago
Selecting the right interestingness measure for association patterns
Many techniques for association rule mining and feature selection require a suitable metric to capture the dependencies among variables in a data set. For example, metrics such as...
Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava
SIAMIS
2010
176views more  SIAMIS 2010»
14 years 8 months ago
Optimized Conformal Surface Registration with Shape-based Landmark Matching
Surface registration, which transforms different sets of surface data into one common reference space, is an important process which allows us to compare or integrate the surface ...
Lok Ming Lui, Sheshadri R. Thiruvenkadam, Yalin Wa...