Sciweavers

1900 search results - page 352 / 380
» Gaussian Processes for Machine Learning
Sort
View
AAAI
2008
13 years 10 months ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...
ISSRE
2007
IEEE
13 years 9 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
LREC
2010
190views Education» more  LREC 2010»
13 years 9 months ago
Applying a Dynamic Bayesian Network Framework to Transliteration Identification
Identification of transliterations is aimed at enriching multilingual lexicons and improving performance in various Natural Language Processing (NLP) applications including Cross ...
Peter Nabende
DGO
2008
113views Education» more  DGO 2008»
13 years 9 months ago
A study in rule-specific issue categorization for e-rulemaking
We address the e-rulemaking problem of categorizing public comments according to the issues that they address. In contrast to previous text categorization research in e-rulemaking...
Claire Cardie, Cynthia Farina, Adil Aijaz, Matt Ra...
LREC
2010
156views Education» more  LREC 2010»
13 years 9 months ago
Studying Word Sketches for Russian
Without any doubt corpora are vital tools for linguistic studies and solution for applied tasks. Although corpora opportunities are very useful, there is a need of another kind of...
Maria Khokhlova, Victor Zakharov