Sciweavers

2208 search results - page 407 / 442
» Privacy-Preserving Classifier Learning
Sort
View
FSS
2008
147views more  FSS 2008»
13 years 8 months ago
A general framework for fuzzy morphological associative memories
Fuzzy associative memories (FAMs) can be used as a powerful tool for implementing fuzzy rule-based systems. The insight that FAMs are closely related to mathematical morphology (M...
Marcos Eduardo Valle, Peter Sussner
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 8 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
IDA
2006
Springer
13 years 8 months ago
Sequential patterns for text categorization
Text categorization is a well-known task based essentially on statistical approaches using neural networks, Support Vector Machines and other machine learning algorithms. Texts are...
Simon Jaillet, Anne Laurent, Maguelonne Teisseire
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
13 years 8 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
IJDAR
2006
131views more  IJDAR 2006»
13 years 8 months ago
Genetic engineering of hierarchical fuzzy regional representations for handwritten character recognition
This paper presents a genetic programming based approach for optimizing the feature extraction step of a handwritten character recognizer. This recognizer uses a simple multilayer ...
Christian Gagné, Marc Parizeau