Sciweavers

989 search results - page 136 / 198
» Classification and regression trees
Sort
View
ISI
2006
Springer
15 years 4 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara
JMLR
2006
156views more  JMLR 2006»
15 years 4 months ago
Large Scale Multiple Kernel Learning
While classical kernel-based learning algorithms are based on a single kernel, in practice it is often desirable to use multiple kernels. Lanckriet et al. (2004) considered conic ...
Sören Sonnenburg, Gunnar Rätsch, Christi...
INTERSPEECH
2010
14 years 11 months ago
Combining five acoustic level modeling methods for automatic speaker age and gender recognition
This paper presents a novel automatic speaker age and gender identification approach which combines five different methods at the acoustic level to improve the baseline performanc...
Ming Li, Chi-Sang Jung, Kyu Jeong Han

Book
778views
17 years 2 months ago
Gaussian Processes for Machine Learning
"Gaussian processes (GPs) provide a principled, practical, probabilistic approach to learning in kernel machines. GPs have received increased attention in the machine-learning...
Carl Edward Rasmussen and Christopher K. I. Willia...
ICMLA
2010
15 years 2 months ago
Smoothing Gene Expression Using Biological Networks
Gene expression (microarray) data have been used widely in bioinformatics. The expression data of a large number of genes from small numbers of subjects are used to identify inform...
Yue Fan, Mark A. Kon, Shinuk Kim, Charles DeLisi