Sciweavers

780 search results - page 126 / 156
» A Comparative Analysis of Selection Schemes Used in Genetic ...
Sort
View
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 4 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
PERCOM
2010
ACM
13 years 6 months ago
All for one or one for all? Combining heterogeneous features for activity spotting
Abstract—Choosing the right feature for motion based activity spotting is not a trivial task. Often, features derived by intuition or that proved to work well in previous work ar...
Ulf Blanke, Bernt Schiele, Matthias Kreil, Paul Lu...
ECML
2003
Springer
14 years 24 days ago
Logistic Model Trees
Abstract. Tree induction methods and linear models are popular techniques for supervised learning tasks, both for the prediction of nominal classes and continuous numeric values. F...
Niels Landwehr, Mark Hall, Eibe Frank
BMCBI
2008
163views more  BMCBI 2008»
13 years 7 months ago
ProfileGrids as a new visual representation of large multiple sequence alignments: a case study of the RecA protein family
Background: Multiple sequence alignments are a fundamental tool for the comparative analysis of proteins and nucleic acids. However, large data sets are no longer manageable for v...
Alberto I. Roca, Albert E. Almada, Aaron C. Abajia...
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 7 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham