Abstract Previously, we have proposed two recommendation systems, the Context-aware Information Filtering (C-IF) and Context-aware Collaborative Filtering (C-CF), both of which ar...
Kenta Oku, Shinsuke Nakajima, Jun Miyazaki, Shunsu...
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
We present an algorithm, witch, that learns to detect spam hosts or pages on the Web. Unlike most other approaches, it simultaneously exploits the structure of the Web graph as we...
Jacob Abernethy, Olivier Chapelle, Carlos Castillo
In this paper we apply three pattern recognition methods (support vector machine, cluster analysis and principal component analysis) to distinguish regulatory regions from coding a...
Rene te Boekhorst, Irina I. Abnizova, Lorenz Werni...
We extend previous work on tree kernels to estimate the similarity between the dependency trees of sentences. Using this kernel within a Support Vector Machine, we detect and clas...