Sciweavers

318 search results - page 61 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
14 years 28 days ago
Predicting the product purchase patterns of corporate customers
This paper describes TIPPPS (Time Interleaved Product Purchase Prediction System), which analyses billing data of corporate customers in a large telecommunications company in orde...
Bhavani Raskutti, Alan Herschtal
AIME
2007
Springer
14 years 1 months ago
An Intelligent Aide for Interpreting a Patient's Dialysis Data Set
Many machines used in the modern hospital settings offer real time physiological monitoring. Haemodialysis machines combine a therapeutic treatment system integrated with sophistic...
Derek H. Sleeman, Nick Fluck, Elias Gyftodimos, La...
WWW
2010
ACM
14 years 2 months ago
A scalable machine-learning approach for semi-structured named entity recognition
Named entity recognition studies the problem of locating and classifying parts of free text into a set of predefined categories. Although extensive research has focused on the de...
Utku Irmak, Reiner Kraft
BMCBI
2010
224views more  BMCBI 2010»
13 years 7 months ago
An adaptive optimal ensemble classifier via bagging and rank aggregation with applications to high dimensional data
Background: Generally speaking, different classifiers tend to work well for certain types of data and conversely, it is usually not known a priori which algorithm will be optimal ...
Susmita Datta, Vasyl Pihur, Somnath Datta
SOSP
2007
ACM
14 years 4 months ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou