Sciweavers

706 search results - page 43 / 142
» A Methodology for Evaluating and Selecting Data Mining Softw...
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 8 months ago
Single-pass online learning: performance, voting schemes and online feature selection
To learn concepts over massive data streams, it is essential to design inference and learning methods that operate in real time with limited memory. Online learning methods such a...
Vitor R. Carvalho, William W. Cohen
BMCBI
2008
219views more  BMCBI 2008»
13 years 8 months ago
Classification of premalignant pancreatic cancer mass-spectrometry data using decision tree ensembles
Background: Pancreatic cancer is the fourth leading cause of cancer death in the United States. Consequently, identification of clinically relevant biomarkers for the early detect...
Guangtao Ge, G. William Wong
CODES
2001
IEEE
13 years 11 months ago
Evaluating register file size in ASIP design
Interest in synthesis of Application Specific Instruction Set Processors or ASIPs has increased considerably and a number of methodologies have been proposed for ASIP design. A ke...
Manoj Kumar Jain, Lars Wehmeyer, Stefan Steinke, P...
SIGSOFT
2005
ACM
14 years 1 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou
CIKM
2010
Springer
13 years 6 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...