Sciweavers

64 search results - page 9 / 13
» Fuzzy relevance vector machine for learning from unbalanced ...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
EUROCON
2011
281views Hardware» more  EUROCON 2011»
12 years 11 months ago
Browsing videos by automatically detected audio events
—This paper focuses on Audio Event Detection (AED), a research area which aims to substantially enhance the access to audio in multimedia content. With the ever-growing quantity ...
Virginia Barbosa, Thomas Pellegrini, Miguel Bugalh...
DATAMINE
2006
157views more  DATAMINE 2006»
13 years 7 months ago
Data Clustering with Partial Supervision
Clustering with partial supervision finds its application in situations where data is neither entirely nor accurately labeled. This paper discusses a semisupervised clustering algo...
Abdelhamid Bouchachia, Witold Pedrycz
ICMLA
2010
13 years 5 months ago
Smoothing Gene Expression Using Biological Networks
Gene expression (microarray) data have been used widely in bioinformatics. The expression data of a large number of genes from small numbers of subjects are used to identify inform...
Yue Fan, Mark A. Kon, Shinuk Kim, Charles DeLisi
ICPR
2000
IEEE
14 years 8 months ago
General Bias/Variance Decomposition with Target Independent Variance of Error Functions Derived from the Exponential Family of D
An important theoretical tool in machine learning is the bias/variance decomposition of the generalization error. It was introduced for the mean square error in [3]. The bias/vari...
Jakob Vogdrup Hansen, Tom Heskes