Sciweavers

62 search results - page 5 / 13
» Analysis of area under the ROC curve of energy detection
Sort
View
CLEF
2011
Springer
12 years 7 months ago
Detecting Wikipedia Vandalism using Machine Learning - Notebook for PAN at CLEF 2011
Wikipedia vandalism identification is a very complex issue, which is now mostly solved manually by volunteers. This paper presents the main components of a system built by our grou...
Cristian-Alexandru Dragusanu, Marina Cufliuc, Adri...
TWC
2010
13 years 2 months ago
Performance of an Energy Detector over Channels with Both Multipath Fading and Shadowing
This paper analyzes the performance of an energy detector over wireless channels with composite multipath fading and shadowing effects. These effects are modeled by using the and ...
Saman Atapattu, Chintha Tellambura, Hai Jiang
CSDA
2007
136views more  CSDA 2007»
13 years 7 months ago
A note on iterative marginal optimization: a simple algorithm for maximum rank correlation estimation
The maximum rank correlation (MRC) estimator was originally studied by Han [1987. Nonparametric analysis of a generalized regression model. J. Econometrics 35, 303–316] and Sher...
Hansheng Wang
CLEF
2008
Springer
13 years 9 months ago
The Visual Concept Detection Task in ImageCLEF 2008
The Visual Concept Detection Task (VCDT) of ImageCLEF 2008 is described. A database of 2,827 images were manually annotated with 17 concepts. Of these, 1,827 were used for trainin...
Thomas Deselaers, Allan Hanbury
JMLR
2006
132views more  JMLR 2006»
13 years 7 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof