Sciweavers

988 search results - page 108 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
AAAI
2004
14 years 11 months ago
Mining Opinion Features in Customer Reviews
It is a common practice that merchants selling products on the Web ask their customers to review the products and associated services. As e-commerce is becoming more and more popu...
Minqing Hu, Bing Liu
ICISC
2004
169views Cryptology» more  ICISC 2004»
14 years 11 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
NIPS
2001
14 years 11 months ago
Probabilistic Inference of Hand Motion from Neural Activity in Motor Cortex
Statistical learning and probabilistic inference techniques are used to infer the hand position of a subject from multi-electrode recordings of neural activity in motor cortex. Fi...
Yun Gao, Michael J. Black, Elie Bienenstock, Shy S...
NIPS
2000
14 years 11 months ago
Text Classification using String Kernels
We propose a novel approach for categorizing text documents based on the use of a special kernel. The kernel is an inner product in the feature space generated by all subsequences...
Huma Lodhi, John Shawe-Taylor, Nello Cristianini, ...
OSDI
2000
ACM
14 years 11 months ago
Trading Capacity for Performance in a Disk Array
A variety of performance-enhancing techniques, such as striping, mirroring, and rotational data replication, exist in the disk array literature. Given a fixed budget of disks, one...
Xiang Yu, Benjamin Gum, Yuqun Chen, Randolph Y. Wa...