Sciweavers

3556 search results - page 151 / 712
» Can machine learning be secure
Sort
View
KDD
1999
ACM
152views Data Mining» more  KDD 1999»
14 years 3 months ago
Applying General Bayesian Techniques to Improve TAN Induction
Tree Augmented Naive Bayes (TAN) has shown to be competitive with state-of-the-art machine learning algorithms [3]. However, the TAN induction algorithm that appears in [3] can be...
Jesús Cerquides
BMCBI
2008
153views more  BMCBI 2008»
13 years 11 months ago
GAPscreener: An automatic tool for screening human genetic association literature in PubMed using the support vector machine tec
Background: Synthesis of data from published human genetic association studies is a critical step in the translation of human genome discoveries into health applications. Although...
Wei Yu, Melinda Clyne, Siobhan M. Dolan, Ajay Yesu...
CGO
2003
IEEE
14 years 4 months ago
Hiding Program Slices for Software Security
Given the high cost of producing software, development of technology for prevention of software piracy is important for the software industry. In this paper we present a novel app...
Xiangyu Zhang, Rajiv Gupta
ICML
2006
IEEE
14 years 11 months ago
Feature subset selection bias for classification learning
Feature selection is often applied to highdimensional data prior to classification learning. Using the same training dataset in both selection and learning can result in socalled ...
Surendra K. Singhi, Huan Liu
ICIP
2000
IEEE
15 years 9 days ago
Incorporate Support Vector Machines to Content-Based Image Retrieval with Relevant Feedback
By using relevance feedback [6], Content-Based Image Retrieval (CBIR) allows the user to retrieve images interactively. The user can select the most relevant images and provide a ...
Pengyu Hong, Qi Tian, Thomas S. Huang