Sciweavers

716 search results - page 59 / 144
» Proactive Network Maintenance Using Machine Learning
Sort
View
IMC
2010
ACM
14 years 12 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
IJCNN
2007
IEEE
15 years 8 months ago
Range Data Approximation for Mobile Robot by Using CAN2
— In this article, we apply the competitive associative net called CAN2 to the processing of the range data of indoor environment acquired by a mobile robot, where the CAN2 is a ...
Takeshi Nishida, Shuichi Kurogi, Yuji Takemura, Hi...
IJCNN
2006
IEEE
15 years 8 months ago
Support Vector Machines to Weight Voters in a Voting System of Entity Extractors
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...
ML
2006
ACM
110views Machine Learning» more  ML 2006»
15 years 2 months ago
Classification-based objective functions
Backpropagation, similar to most learning algorithms that can form complex decision surfaces, is prone to overfitting. This work presents classification-based objective functions, ...
Michael Rimer, Tony Martinez
ICWSM
2009
14 years 11 months ago
Delta TFIDF: An Improved Feature Space for Sentiment Analysis
Mining opinions and sentiment from social networking sites is a popular application for social media systems. Common approaches use a machine learning system with a bag of words f...
Justin Martineau, Tim Finin