Sciweavers

354 search results - page 45 / 71
» Restart Strategy Selection Using Machine Learning Techniques
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
ICONS
2008
IEEE
15 years 4 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
MOBISYS
2009
ACM
15 years 10 months ago
Sensor selection for energy-efficient ambulatory medical monitoring
Epilepsy affects over three million Americans of all ages. Despite recent advances, more than 20% of individuals with epilepsy never achieve adequate control of their seizures. Th...
Eugene Shih, Ali H. Shoeb, John V. Guttag
84
Voted
ALS
2003
Springer
15 years 2 months ago
Anticipatory Behavioral Control
Despite recent successes in control theoretical programs for limb control, behavior-based cognitive approaches for control are somewhat lacking behind. Insights in psychology and ...
Joachim Hoffmann
KDD
2002
ACM
106views Data Mining» more  KDD 2002»
15 years 10 months ago
Selecting the right interestingness measure for association patterns
Many techniques for association rule mining and feature selection require a suitable metric to capture the dependencies among variables in a data set. For example, metrics such as...
Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava