Sciweavers

861 search results - page 71 / 173
» Predicting Attack-prone Components
Sort
View
IPM
2006
130views more  IPM 2006»
13 years 10 months ago
Exploiting structural information for semi-structured document categorization
This paper examines several different approaches to exploiting structural information in semi-structured document categorization. The methods under consideration are designed for ...
Andrej Bratko, Bogdan Filipic
ICMLA
2009
13 years 8 months ago
Improving Clinical Relevance in Ensemble Support Vector Machine Models of Radiation Pneumonitis Risk
Patients undergoing thoracic radiation therapy can develop radiation pneumonitis (RP), a potentially fatal inflammation of the lungs. Support vector machines (SVMs), a statistical...
Todd W. Schiller, Yixin Chen, Issam El-Naqa, Josep...
IJCBDD
2011
112views more  IJCBDD 2011»
13 years 5 months ago
A novel network model identified a 13-gene lung cancer prognostic signature
: This study presents a novel network methodology to identify prognostic gene signatures. Implication networks based on prediction logic are used to construct genome-wide coexpress...
Nancy Lan Guo, Ying-Wooi Wan, Swetha Bose, James D...
JMLR
2011
187views more  JMLR 2011»
13 years 5 months ago
Exploitation of Machine Learning Techniques in Modelling Phrase Movements for Machine Translation
We propose a distance phrase reordering model (DPR) for statistical machine translation (SMT), where the aim is to learn the grammatical rules and context dependent changes using ...
Yizhao Ni, Craig Saunders, Sándor Szedm&aac...
ICIP
2002
IEEE
15 years 11 days ago
An ICA algorithm for analyzing multiple data sets
In this paper we derive an independent-component analysis (ICA) method for analyzing two or more data sets simultaneously. Our model permits there to be components individual to t...
Ana S. Lukic, Lars Kai Hansen, Miles N. Wernick, S...