Sciweavers

627 search results - page 95 / 126
» Learning from Logged Implicit Exploration Data
Sort
View
BMCBI
2010
133views more  BMCBI 2010»
13 years 8 months ago
New components of the Dictyostelium PKA pathway revealed by Bayesian analysis of expression data
Background: Identifying candidate genes in genetic networks is important for understanding regulation and biological function. Large gene expression datasets contain relevant info...
Anup Parikh, Eryong Huang, Christopher Dinh, Blaz ...
APIN
1998
132views more  APIN 1998»
13 years 8 months ago
Evolution-Based Methods for Selecting Point Data for Object Localization: Applications to Computer-Assisted Surgery
Object localization has applications in many areas of engineering and science. The goal is to spatially locate an arbitrarily-shaped object. In many applications, it is desirable ...
Shumeet Baluja, David Simon
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
PKDD
2009
Springer
118views Data Mining» more  PKDD 2009»
14 years 3 months ago
Sparse Kernel SVMs via Cutting-Plane Training
We explore an algorithm for training SVMs with Kernels that can represent the learned rule using arbitrary basis vectors, not just the support vectors (SVs) from the training set. ...
Thorsten Joachims, Chun-Nam John Yu
JDIM
2010
157views more  JDIM 2010»
13 years 3 months ago
Case studies on context-aware mobile multimedia services
: This paper explores the design, implementation and evaluation of context-aware mobile multimedia services by presenting six case studies on different application domains. The cas...
Timo Ojala