Sciweavers

531 search results - page 87 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
CISIS
2008
IEEE
15 years 8 months ago
Inferring the Function of Genes from Synthetic Lethal Mutations
—Techniques for detecting synthetic lethal mutations in double gene deletion experiments are emerging as powerful tool for analysing genes in parallel or overlapping pathways wit...
Oliver Ray, Christopher H. Bryant
ISMAR
2009
IEEE
15 years 8 months ago
Augmenting text document by on-line learning of local arrangement of keypoints
We propose a technique for text document tracking over a large range of viewpoints. Since the popular SIFT or SURF descriptors typically fail on such documents, our method conside...
Hideaki Uchiyama, Hideo Saito
97
Voted
EDM
2010
121views Data Mining» more  EDM 2010»
15 years 23 hour ago
Identifying Students' Inquiry Planning Using Machine Learning
This research investigates the detection of student meta-cognitive planning processes in real-time using log tracing techniques. We use fine and coarse-grained data distillation, i...
Orlando Montalvo, Ryan Shaun Joazeiro de Baker, Mi...
AIRWEB
2008
Springer
15 years 3 months ago
Identifying web spam with user behavior analysis
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Rongwei Cen, Min Zhang, Shaoping Ma, Li...
DEBS
2010
ACM
15 years 5 months ago
Logic-based representation, reasoning and machine learning for event recognition
Today’s organisations require techniques for automated transformation of the large data volumes they collect during their operations into operational knowledge. This requirement...
Alexander Artikis, Georgios Paliouras, Franç...