Sciweavers

1605 search results - page 207 / 321
» Metric Learning to Rank
Sort
View
ICONIP
2008
15 years 5 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
CSL
2010
Springer
15 years 4 months ago
Evaluation of a hierarchical reinforcement learning spoken dialogue system
We describe an evaluation of spoken dialogue strategies designed using hierarchical reinforcement learning agents. The dialogue strategies were learnt in a simulated environment a...
Heriberto Cuayáhuitl, Steve Renals, Oliver ...
ML
2010
ACM
155views Machine Learning» more  ML 2010»
15 years 2 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
137
Voted
BMVC
2010
15 years 2 months ago
Manifold Learning for Multi-Modal Image Registration
The standard approach to multi-modal registration is to apply sophisticated similarity metrics such as mutual information. The disadvantage of these measures, in contrast to simpl...
Christian Wachinger, Nassir Navab
ICST
2009
IEEE
15 years 1 months ago
Test Redundancy Measurement Based on Coverage Information: Evaluations and Lessons Learned
Measurement and detection of redundancy in test suites attempt to achieve test minimization which in turn can help reduce test maintenance costs, and to also ensure the integrity ...
Negar Koochakzadeh, Vahid Garousi, Frank Maurer