Sciweavers

3556 search results - page 627 / 712
» Can machine learning be secure
Sort
View
ISBI
2008
IEEE
14 years 11 months ago
Phase contrast image segmentation by weak watershed transform assembly
We present here a method giving a robust segmentation for in vitro cells observed under standard phase-contrast microscopy. We tackle the problem using the watershed transform. Wa...
Olivier Debeir, Ivan Adanja, Nadine Warzée,...
WWW
2007
ACM
14 years 11 months ago
U-REST: an unsupervised record extraction system
In this paper, we describe a system that can extract record structures from web pages with no direct human supervision. Records are commonly occurring HTML-embedded data tuples th...
Yuan Kui Shen, David R. Karger
WWW
2004
ACM
14 years 11 months ago
Using urls and table layout for web classification tasks
We propose new features and algorithms for automating Web-page classification tasks such as content recommendation and ad blocking. We show that the automated classification of We...
L. K. Shih, David R. Karger
HPCA
2009
IEEE
14 years 10 months ago
Voltage emergency prediction: Using signatures to reduce operating margins
Inductive noise forces microprocessor designers to sacrifice performance in order to ensure correct and reliable operation of their designs. The possibility of wide fluctuations i...
Vijay Janapa Reddi, Meeta Sharma Gupta, Glenn H. H...
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
14 years 10 months ago
Scaling up text classification for large file systems
: We combine the speed and scalability of information retrieval with the generally superior classification accuracy offered by machine learning, yielding a two-phase text classifie...
George Forman, Shyamsundar Rajaram