Sciweavers

716 search results - page 59 / 144
» Proactive Network Maintenance Using Machine Learning
Sort
View
IMC
2010
ACM
13 years 5 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
IJCNN
2007
IEEE
14 years 2 months ago
Range Data Approximation for Mobile Robot by Using CAN2
— In this article, we apply the competitive associative net called CAN2 to the processing of the range data of indoor environment acquired by a mobile robot, where the CAN2 is a ...
Takeshi Nishida, Shuichi Kurogi, Yuji Takemura, Hi...
IJCNN
2006
IEEE
14 years 1 months ago
Support Vector Machines to Weight Voters in a Voting System of Entity Extractors
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...
ML
2006
ACM
110views Machine Learning» more  ML 2006»
13 years 7 months ago
Classification-based objective functions
Backpropagation, similar to most learning algorithms that can form complex decision surfaces, is prone to overfitting. This work presents classification-based objective functions, ...
Michael Rimer, Tony Martinez
ICWSM
2009
13 years 5 months ago
Delta TFIDF: An Improved Feature Space for Sentiment Analysis
Mining opinions and sentiment from social networking sites is a popular application for social media systems. Common approaches use a machine learning system with a bag of words f...
Justin Martineau, Tim Finin