Sciweavers

7351 search results - page 1358 / 1471
» Machine Learning
Sort
View
TKDE
2011
186views more  TKDE 2011»
14 years 4 months ago
Discovering Activities to Recognize and Track in a Smart Environment
—The machine learning and pervasive sensing technologies found in smart homes offer unprecedented opportunities for providing health monitoring and assistance to individuals expe...
Parisa Rashidi, Diane J. Cook, Lawrence B. Holder,...
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 4 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
JMLR
2010
161views more  JMLR 2010»
14 years 4 months ago
Accuracy-Rejection Curves (ARCs) for Comparing Classification Methods with a Reject Option
Data extracted from microarrays are now considered an important source of knowledge about various diseases. Several studies based on microarray data and the use of receiver operat...
Malik Sajjad Ahmed Nadeem, Jean-Daniel Zucker, Bla...
JMLR
2010
145views more  JMLR 2010»
14 years 4 months ago
Event based text mining for integrated network construction
The scientific literature is a rich and challenging data source for research in systems biology, providing numerous interactions between biological entities. Text mining technique...
Yvan Saeys, Sofie Van Landeghem, Yves Van de Peer
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
« Prev « First page 1358 / 1471 Last » Next »