Sciweavers

8381 search results - page 1630 / 1677
» The security of machine learning
Sort
View
ICDM
2009
IEEE
198views Data Mining» more  ICDM 2009»
15 years 4 months ago
Information Extraction for Clinical Data Mining: A Mammography Case Study
Abstract—Breast cancer is the leading cause of cancer mortality in women between the ages of 15 and 54. During mammography screening, radiologists use a strict lexicon (BI-RADS) ...
Houssam Nassif, Ryan Woods, Elizabeth S. Burnside,...
91
Voted
ICST
2009
IEEE
15 years 4 months ago
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
It is challenging to test applications and functions for which the correct output for arbitrary input cannot be known in advance, e.g. some computational science or machine learni...
Christian Murphy, Kuang Shen, Gail E. Kaiser
WEBDB
2009
Springer
149views Database» more  WEBDB 2009»
15 years 4 months ago
Extracting Route Directions from Web Pages
Linguists and geographers are more and more interested in route direction documents because they contain interesting motion descriptions and language patterns. A large number of s...
Xiao Zhang, Prasenjit Mitra, Sen Xu, Anuj R. Jaisw...
86
Voted
RAID
2009
Springer
15 years 4 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
82
Voted
RECSYS
2009
ACM
15 years 4 months ago
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models
Previous work on using external aggregate rating information showed that this information can be incorporated in several different types of recommender systems and improves their...
Akhmed Umyarov, Alexander Tuzhilin
« Prev « First page 1630 / 1677 Last » Next »