Sciweavers

3949 search results - page 758 / 790
» Machine Learning and Data Mining
Sort
View
CSREASAM
2003
14 years 11 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen
SPIESR
2003
165views Database» more  SPIESR 2003»
14 years 11 months ago
Analysis of musical expression in audio signals
In western art music, composers communicate their work to performers via a standard notation which specificies the musical pitches and relative timings of notes. This notation ma...
Simon Dixon
UAI
2003
14 years 11 months ago
Exploiting Locality in Searching the Web
Published experiments on spidering the Web suggest that, given training data in the form of a (relatively small) subgraph of the Web containing a subset of a selected class of tar...
Joel Young, Thomas Dean
CIDR
2009
157views Algorithms» more  CIDR 2009»
14 years 10 months ago
SCADS: Scale-Independent Storage for Social Computing Applications
Collaborative web applications such as Facebook, Flickr and Yelp present new challenges for storing and querying large amounts of data. As users and developers are focused more on...
Michael Armbrust, Armando Fox, David A. Patterson,...
DATAMINE
2010
122views more  DATAMINE 2010»
14 years 9 months ago
Three naive Bayes approaches for discrimination-free classification
In this paper, we investigate how to modify the Naive Bayes classifier in order to perform classification that is restricted to be independent with respect to a given sensitive att...
Toon Calders, Sicco Verwer