Sciweavers

2190 search results - page 400 / 438
» Learning with the Set Covering Machine
Sort
View
CEAS
2008
Springer
13 years 9 months ago
Filtering Email Spam in the Presence of Noisy User Feedback
Recent email spam filtering evaluations, such as those conducted at TREC, have shown that near-perfect filtering results are attained with a variety of machine learning methods wh...
D. Sculley, Gordon V. Cormack
CIKM
2008
Springer
13 years 9 months ago
The role of syntactic features in protein interaction extraction
Most approaches for protein interaction mining from biomedical texts use both lexical and syntactic features. However, the individual impact of these two kinds of features on the ...
Timur Fayruzov, Martine De Cock, Chris Cornelis, V...
ECOOP
2008
Springer
13 years 9 months ago
Online Phase-Adaptive Data Layout Selection
Good data layouts improve cache and TLB performance of object-oriented software, but unfortunately, selecting an optimal data layout a priori is NP-hard. This paper introduces layo...
Chengliang Zhang, Martin Hirzel
ISSRE
2007
IEEE
13 years 9 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
LREC
2010
190views Education» more  LREC 2010»
13 years 9 months ago
Applying a Dynamic Bayesian Network Framework to Transliteration Identification
Identification of transliterations is aimed at enriching multilingual lexicons and improving performance in various Natural Language Processing (NLP) applications including Cross ...
Peter Nabende