Sciweavers

8381 search results - page 1637 / 1677
» The security of machine learning
Sort
View
KELSI
2004
Springer
15 years 3 months ago
Improving Rule Induction Precision for Automated Annotation by Balancing Skewed Data Sets
There is an overwhelming increase in submissions to genomic databases, posing a problem for database maintenance, especially regarding annotation of fields left blank during submi...
Gustavo E. A. P. A. Batista, Maria Carolina Monard...
MLMI
2004
Springer
15 years 3 months ago
An Integrated Framework for the Management of Video Collection
Video document retrieval is now an active part of the domain of multimedia retrieval. However, unlike for other media, the management of a collection of video documents adds the pr...
Nicolas Moënne-Loccoz, Bruno Janvier, St&eacu...
TSD
2004
Springer
15 years 3 months ago
Modeling Prosodic Structures in Linguistically Enriched Environments
A significant challenge in Text-to-Speech (TtS) synthesis is the formulation of the prosodic structures (phrase breaks, pitch accents, phrase accents and boundary tones) of uttera...
Gerasimos Xydas, Dimitris Spiliotopoulos, Georgios...
UPP
2004
Springer
15 years 3 months ago
Inverse Design of Cellular Automata by Genetic Algorithms: An Unconventional Programming Paradigm
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Thomas Bäck, Ron Breukelaar, Lars Willmes
WKDD
2010
CPS
204views Data Mining» more  WKDD 2010»
15 years 3 months ago
A Scalable, Accurate Hybrid Recommender System
—Recommender systems apply machine learning techniques for filtering unseen information and can predict whether a user would like a given resource. There are three main types of...
Mustansar Ali Ghazanfar, Adam Prügel-Bennett
« Prev « First page 1637 / 1677 Last » Next »