Sciweavers

1436 search results - page 282 / 288
» Using Machine Learning Techniques to Interpret WH-questions
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
15 years 10 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
SOSP
2007
ACM
15 years 6 months ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou
JMLR
2010
147views more  JMLR 2010»
14 years 4 months ago
Image Denoising with Kernels Based on Natural Image Relations
A successful class of image denoising methods is based on Bayesian approaches working in wavelet representations. The performance of these methods improves when relations among th...
Valero Laparra, Juan Gutierrez, Gustavo Camps-Vall...
PVLDB
2010
116views more  PVLDB 2010»
14 years 4 months ago
Schism: a Workload-Driven Approach to Database Replication and Partitioning
We present Schism, a novel workload-aware approach for database partitioning and replication designed to improve scalability of sharednothing distributed databases. Because distri...
Carlo Curino, Yang Zhang, Evan P. C. Jones, Samuel...
AAAI
1994
14 years 11 months ago
Corpus-Driven Knowledge Acquisition for Discourse Analysis
The availability of large on-line text corpora provides a natural and promising bridge between the worlds of natural language processing (NLP) and machine learning (ML). In recent...
Stephen Soderland, Wendy G. Lehnert