Sciweavers

2958 search results - page 472 / 592
» Using Anonymized Data for Classification
Sort
View
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
15 years 3 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth
CLEF
2010
Springer
15 years 3 months ago
ZOT! to Wikipedia Vandalism - Lab Report for PAN at CLEF 2010
Abstract This vandalism detector uses features primarily derived from a wordpreserving differencing of the text for each Wikipedia article from before and after the edit, along wit...
James White, Rebecca Maessen
115
Voted
ICML
2010
IEEE
15 years 3 months ago
Local Minima Embedding
Dimensionality reduction is a commonly used step in many algorithms for visualization, classification, clustering and modeling. Most dimensionality reduction algorithms find a low...
Minyoung Kim, Fernando De la Torre
CMOT
2002
73views more  CMOT 2002»
15 years 2 months ago
A Structural and Evolutionary Approach to Change Management
Organizational change management is concerned with realizing strategies using models, methods and prescriptions that seek to guide the three key elements of strategic management p...
Thierry Rakotobe-Joel, Ian P. McCarthy, David Tran...
GPEM
2002
104views more  GPEM 2002»
15 years 2 months ago
Genetic Programming-based Construction of Features for Machine Learning and Knowledge Discovery Tasks
In this paper we use genetic programming for changing the representation of the input data for machine learners. In particular, the topic of interest here is feature construction i...
Krzysztof Krawiec