Sciweavers

433 search results - page 58 / 87
» Local-Learning-Based Feature Selection for High-Dimensional ...
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 8 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
ICIP
2000
IEEE
14 years 9 months ago
Analysis of Corneal Images for Assessing Contact Lens Trauma
Contact lens wearers are often affected by a condition known as conjuctival hyperaemia. This condition is characterised by dilated blood vessels visible in the sclera (the white p...
Janine Cullen, Paul W. Fieguth, Shane Pounder, Kim...
ICCV
1999
IEEE
14 years 4 days ago
Motion Segmentation based on Factorization Method and Discriminant Criterion
A motion segmentation algorithm based on factorization method and discriminant criterion is proposed. This method uses a feature with the most useful similarities for grouping, se...
Naoyuki Ichimura
KDD
2008
ACM
134views Data Mining» more  KDD 2008»
14 years 8 months ago
Privacy-preserving cox regression for survival analysis
Privacy-preserving data mining (PPDM) is an emergent research area that addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper we prop...
Shipeng Yu, Glenn Fung, Rómer Rosales, Srir...
KCAP
2011
ACM
12 years 10 months ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...