Sciweavers

2037 search results - page 278 / 408
» Chunking with Support Vector Machines
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 9 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
SAC
2009
ACM
14 years 4 months ago
Visual detection of novel terrain via two-class classification
Remote sensing of terrain characteristics is an important component for autonomous operation of mobile robots in natural terrain. Often this involves classification of terrain int...
Christopher A. Brooks, Karl Iagnemma
CEC
2009
IEEE
14 years 4 months ago
Evolving hypernetwork models of binary time series for forecasting price movements on stock markets
— The paper proposes a hypernetwork-based method for stock market prediction through a binary time series problem. Hypernetworks are a random hypergraph structure of higher-order...
Elena Bautu, Sun Kim, Andrei Bautu, Henri Luchian,...
BIBM
2008
IEEE
172views Bioinformatics» more  BIBM 2008»
14 years 3 months ago
Boosting Methods for Protein Fold Recognition: An Empirical Comparison
Protein fold recognition is the prediction of protein’s tertiary structure (Fold) given the protein’s sequence without relying on sequence similarity. Using machine learning t...
Yazhene Krishnaraj, Chandan K. Reddy
ICDM
2008
IEEE
136views Data Mining» more  ICDM 2008»
14 years 3 months ago
Generalized Framework for Syntax-Based Relation Mining
Supervised approaches to Data Mining are particularly appealing as they allow for the extraction of complex relations from data objects. In order to facilitate their application i...
Bonaventura Coppola, Alessandro Moschitti, Daniele...