Sciweavers

7853 search results - page 62 / 1571
» Learning from Each Other
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 9 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
IJCNN
2008
IEEE
14 years 3 months ago
Learning associations of conjuncted fuzzy sets for data prediction
— Fuzzy Associative Conjuncted Maps (FASCOM) is a fuzzy neural network that represents information by conjuncting fuzzy sets and associates them through a combination of unsuperv...
Hanlin Goh, Joo-Hwee Lim, Chai Quek
ECML
2007
Springer
14 years 2 months ago
Learning an Outlier-Robust Kalman Filter
We introduce a modified Kalman filter that performs robust, real-time outlier detection, without the need for manual parameter tuning by the user. Systems that rely on high quali...
Jo-Anne Ting, Evangelos Theodorou, Stefan Schaal
ICCSA
2011
Springer
13 years 5 days ago
Integration of ePortfolios in Learning Management Systems
The LMS plays a decisive role in most eLearning environments. Although they integrate many useful tools for managing eLearning activities, they must also be effectively integrated ...
Ricardo Queirós, Lino Oliveira, José...
ICPR
2006
IEEE
14 years 9 months ago
Learning Pairwise Similarity for Data Clustering
Each clustering algorithm induces a similarity between given data points, according to the underlying clustering criteria. Given the large number of available clustering technique...
Ana L. N. Fred, Anil K. Jain