Sciweavers

8381 search results - page 1598 / 1677
» The security of machine learning
Sort
View
RSEISP
2007
Springer
15 years 6 months ago
Checking Brain Expertise Using Rough Set Theory
Most information about the external world comes from our visual brain. However, it is not clear how this information is processed. We will analyze brain responses using machine lea...
Andrzej W. Przybyszewski
119
Voted
DOCENG
2006
ACM
15 years 6 months ago
NEWPAR: an automatic feature selection and weighting schema for category ranking
Category ranking provides a way to classify plain text documents into a pre-determined set of categories. This work proposes to have a look at typical document collections and ana...
Fernando Ruiz-Rico, José Luis Vicedo Gonz&a...
106
Voted
CLEF
2005
Springer
15 years 6 months ago
The Use of MedGIFT and EasyIR for ImageCLEF 2005
This article describes the use of the medGIFT and easyIR retrieval systems for three of the four ImageCLEF 2005 retrieval tasks. We participated in the ad–hoc retrieval task that...
Henning Müller, Antoine Geissbühler, Joh...
97
Voted
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
15 years 6 months ago
Price prediction and insurance for online auctions
Online auctions are generating a new class of fine-grained data about online transactions. This data lends itself to a variety of applications and services that can be provided to...
Rayid Ghani
85
Voted
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
15 years 6 months ago
Predicting the product purchase patterns of corporate customers
This paper describes TIPPPS (Time Interleaved Product Purchase Prediction System), which analyses billing data of corporate customers in a large telecommunications company in orde...
Bhavani Raskutti, Alan Herschtal
« Prev « First page 1598 / 1677 Last » Next »