Sciweavers

2681 search results - page 418 / 537
» Learning to learn with the informative vector machine
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 3 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ROMAN
2007
IEEE
179views Robotics» more  ROMAN 2007»
14 years 3 months ago
Online Affect Detection and Adaptation in Robot Assisted Rehabilitation for Children with Autism
–This paper presents a novel affect-sensitive human-robot interaction framework for rehabilitation of children with autism spectrum disorder (ASD) where the robot can detect the ...
Changchun Liu, Karla Conn, Nilanjan Sarkar, Wendy ...
SSDBM
2006
IEEE
121views Database» more  SSDBM 2006»
14 years 3 months ago
Time Series Analysis Using the Concept of Adaptable Threshold Similarity
The issue of data mining in time series databases is of utmost importance for many practical applications and has attracted a lot of research in the past years. In this paper, we ...
Johannes Aßfalg, Hans-Peter Kriegel, Peer Kr...
ACIVS
2006
Springer
14 years 3 months ago
Discrete Choice Models for Static Facial Expression Recognition
In this paper we propose the use of Discrete Choice Analysis (DCA) for static facial expression classification. Facial expressions are described with expression descriptive units ...
Gianluca Antonini, Matteo Sorci, Michel Bierlaire,...
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
14 years 2 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...