Sciweavers

1669 search results - page 310 / 334
» SMO-Style Algorithms for Learning Using Privileged Informati...
Sort
View
IEEEARES
2010
IEEE
14 years 23 days ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
PAKDD
2000
ACM
140views Data Mining» more  PAKDD 2000»
13 years 11 months ago
Performance Controlled Data Reduction for Knowledge Discovery in Distributed Databases
The objective of data reduction is to obtain a compact representation of a large data set to facilitate repeated use of non-redundant information with complex and slow learning alg...
Slobodan Vucetic, Zoran Obradovic
AAAI
2006
13 years 9 months ago
OntoSearch: A Full-Text Search Engine for the Semantic Web
OntoSearch, a full-text search engine that exploits ontological knowledge for document retrieval, is presented in this paper. Different from other ontology based search engines, O...
Xing Jiang, Ah-Hwee Tan
DIS
2008
Springer
13 years 8 months ago
Empirical Asymmetric Selective Transfer in Multi-objective Decision Trees
We consider learning tasks where multiple target variables need to be predicted. Two approaches have been used in this setting: (a) build a separate single-target model for each ta...
Beau Piccart, Jan Struyf, Hendrik Blockeel
JIIS
2002
130views more  JIIS 2002»
13 years 7 months ago
Image Mining: Trends and Developments
Advances in image acquisition and storage technology have led to tremendous growth in very large and detailed image databases. These images, if analyzed, can reveal useful informa...
Wynne Hsu, Mong-Li Lee, Ji Zhang