Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
Rescaling is possibly the most popular approach to cost-sensitive learning. This approach works by rescaling the classes according to their costs, and it can be realized in differ...
A prime business concern is knowing your customer. One legacy carried into the present from the earliest NCSA web servers is web server logs. While there are more powerful user tr...
Within the last two decades, Receiver Operating Characteristic (ROC) Curves have become a standard tool for the analysis and comparison of classifiers since they provide a conveni...
Stephan M. Winkler, Michael Affenzeller, Stefan Wa...
In this paper, we draw an analogy between image retrieval and text retrieval and propose a visual phrase-based approach to retrieve images containing desired objects. The visual p...