Sciweavers

102 search results - page 11 / 21
» Detection of Cognitive States from fMRI Data Using Machine L...
Sort
View
ICML
2009
IEEE
14 years 8 months ago
Identifying suspicious URLs: an application of large-scale online learning
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...
KDD
2004
ACM
198views Data Mining» more  KDD 2004»
14 years 27 days ago
Mining traffic data from probe-car system for travel time prediction
We are developing a technique to predict travel time of a vehicle for an objective road section, based on real time traffic data collected through a probe-car system. In the area ...
Takayuki Nakata, Jun-ichi Takeuchi
ICML
2005
IEEE
14 years 8 months ago
Clustering through ranking on manifolds
Clustering aims to find useful hidden structures in data. In this paper we present a new clustering algorithm that builds upon the consistency method (Zhou, et.al., 2003), a semi-...
Markus Breitenbach, Gregory Z. Grudic
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
14 years 2 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
BMCBI
2008
143views more  BMCBI 2008»
13 years 7 months ago
Automatic detection of exonic splicing enhancers (ESEs) using SVMs
Background: Exonic splicing enhancers (ESEs) activate nearby splice sites and promote the inclusion (vs. exclusion) of exons in which they reside, while being a binding site for S...
Britta Mersch, Alexander Gepperth, Sándor S...