Sciweavers

271 search results - page 28 / 55
» Automatic analysis of malware behavior using machine learnin...
Sort
View
JUCS
2008
160views more  JUCS 2008»
13 years 8 months ago
Automatic Construction of Fuzzy Rule Bases: a further Investigation into two Alternative Inductive Approaches
: The definition of the Fuzzy Rule Base is one of the most important and difficult tasks when designing Fuzzy Systems. This paper discusses the results of two different hybrid meth...
Marcos Evandro Cintra, Heloisa de Arruda Camargo, ...
TC
1998
13 years 8 months ago
Abstraction Techniques for Validation Coverage Analysis and Test Generation
ion Techniques for Validation Coverage Analysis and Test Generation Dinos Moundanos, Jacob A. Abraham, Fellow, IEEE, and Yatin V. Hoskote —The enormous state spaces which must be...
Dinos Moundanos, Jacob A. Abraham, Yatin Vasant Ho...
ML
2010
ACM
163views Machine Learning» more  ML 2010»
13 years 3 months ago
Classification with guaranteed probability of error
We introduce a general-purpose learning machine that we call the Guaranteed Error Machine, or GEM, and two learning algorithms, a real GEM algorithm and an ideal GEM algorithm. Th...
Marco C. Campi
ICDAR
2011
IEEE
12 years 8 months ago
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning
—Reading text from photographs is a challenging problem that has received a signicant amount of attention. Two key components of most systems are (i) text detection from images a...
Adam Coates, Blake Carpenter, Carl Case, Sanjeev S...
MLMI
2007
Springer
14 years 2 months ago
Binaural Speech Separation Using Recurrent Timing Neural Networks for Joint F0-Localisation Estimation
A speech separation system is described in which sources are represented in a joint interaural time difference-fundamental frequency (ITD-F0) cue space. Traditionally, recurrent t...
Stuart N. Wrigley, Guy J. Brown