Sciweavers

346 search results - page 61 / 70
» An Experimental Comparison of Human and Machine Learning For...
Sort
View
ICMLC
2010
Springer
13 years 6 months ago
An integrity-based fuzzy c-means method resolving cluster size sensitivity problem
: Cluster size insensitive FCM (csiFCM) dynamically adjusts the membership value of each object based on the size of the cluster to which it is assigned after defuzzification to re...
Y. H. Lai, P. W. Huang, P. L. Lin
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ARGMAS
2007
Springer
13 years 11 months ago
Arguing and Explaining Classifications
Argumentation is a promising approach used by autonomous agents for reasoning about inconsistent knowledge, based on the construction and the comparison of arguments. In this pape...
Leila Amgoud, Mathieu Serrurier
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
14 years 8 months ago
Email data cleaning
Addressed in this paper is the issue of `email data cleaning' for text mining. Many text mining applications need take emails as input. Email data is usually noisy and thus i...
Jie Tang, Hang Li, Yunbo Cao, ZhaoHui Tang
CEC
2010
IEEE
13 years 8 months ago
Evolutionary layered hypernetworks for identifying microRNA-mRNA regulatory modules
Abstract-- Exploring microRNA (miRNA) and mRNA regulatory interactions may give new insights into diverse biological phenomena. While elucidating complex miRNA-mRNA interactions ha...
Soo-Jin Kim, JungWoo Ha, Bado Lee, Byoung-Tak Zhan...