This paper presents a decoupled two stage solution to the multiple-instance learning (MIL) problem. With a constructed affinity matrix to reflect the instance relations, a modified...
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
We propose a new family of latent variable models called max-margin min-entropy (m3e) models, which define a distribution over the output and the hidden variables conditioned on ...
Kevin Miller, M. Pawan Kumar, Benjamin Packer, Dan...
Abstract— We applied Support Vector Machines to the prediction of the subcellular localization of transmembrane proteins, and compared the performance of different sequence kerne...
Stefan Maetschke, Marcus Gallagher, Mikael Bod&eac...
Protein phosphorylation is a crucial regulatory mechanism in various organisms. With recent improvements in mass spectrometry, phosphorylation site data are rapidly accumulating. D...
Jianjiong Gao, Ganesh Kumar Agrawal, Jay J. Thelen...