Sciweavers

1824 search results - page 199 / 365
» Pose Classification Using Support Vector Machines
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 8 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
165
Voted
ESANN
2006
15 years 3 months ago
Random Forests Feature Selection with K-PLS: Detecting Ischemia from Magnetocardiograms
Random Forests were introduced by Breiman for feature (variable) selection and improved predictions for decision tree models. The resulting model is often superior to AdaBoost and ...
Long Han, Mark J. Embrechts, Boleslaw K. Szymanski...
ACL
2012
13 years 4 months ago
Authorship Attribution with Author-aware Topic Models
Authorship attribution deals with identifying the authors of anonymous texts. Building on our earlier finding that the Latent Dirichlet Allocation (LDA) topic model can be used t...
Yanir Seroussi, Fabian Bohnert, Ingrid Zukerman
133
Voted
ICML
2009
IEEE
16 years 3 months ago
Group lasso with overlap and graph lasso
We propose a new penalty function which, when used as regularization for empirical risk minimization procedures, leads to sparse estimators. The support of the sparse vector is ty...
Laurent Jacob, Guillaume Obozinski, Jean-Philippe ...
ICPR
2010
IEEE
15 years 5 months ago
Feature Selection Using Multiobjective Optimization for Named Entity Recognition
Appropriate feature selection is a very crucial issue in any machine learning framework, specially in Maximum Entropy (ME). In this paper, the selection of appropriate features for...
Asif Ekbal, Sriparna Saha