Sciweavers

7581 search results - page 1299 / 1517
» Incompleteness in Data Mining
Sort
View
EKAW
2006
Springer
15 years 8 months ago
Iterative Bayesian Network Implementation by Using Annotated Association Rules
Abstract. This paper concerns the iterative implementation of a knowledge model in a data mining context. Our approach relies on coupling a Bayesian network design with an associat...
Clément Fauré, Sylvie Delprat, Jean-...
140
Voted
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
15 years 8 months ago
A new version of the ant-miner algorithm discovering unordered rule sets
The Ant-Miner algorithm, first proposed by Parpinelli and colleagues, applies an ant colony optimization heuristic to the classification task of data mining to discover an ordered...
James Smaldon, Alex Alves Freitas
APAQS
2001
IEEE
15 years 8 months ago
Object-Oriented Program Behavior Analysis Based on Control Patterns
Code-patterns are statically recurring structure specific to a programming language. It can be parallel to aid in designing software systems for solving particular problems. Contr...
C.-C. Hwang, S.-K. Huang, D.-J. Chen, D. Chen
CBMS
2001
IEEE
15 years 8 months ago
Automated Medical Citation Records Creation for Web-Based On-Line Journals
With the rapid expansion and utilization of the Internet and Web technologies, there is an increasing number of on-line medical journals. On-line journals pose new challenges in t...
Daniel X. Le, Loc Q. Tran, Joseph Chow, Jongwoo Ki...
ICPR
2010
IEEE
15 years 7 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
« Prev « First page 1299 / 1517 Last » Next »