Sciweavers

502 search results - page 19 / 101
» Streaming Random Forests
Sort
View
AUSDM
2006
Springer
202views Data Mining» more  AUSDM 2006»
14 years 1 months ago
A Comparative Study of Classification Methods For Microarray Data Analysis
In response to the rapid development of DNA Microarray technology, many classification methods have been used for Microarray classification. SVMs, decision trees, Bagging, Boostin...
Hong Hu, Jiuyong Li, Ashley W. Plank, Hua Wang, Gr...
CLEF
2010
Springer
13 years 11 months ago
ImageCLEF 2010 Working Notes on the Modality Classification Subtask
The goal of this work is to investigate the performance of classical methods for feature description and classification, and to identify the difficulties of the ImageCLEF 2010 moda...
Olivier Pauly, Diana Mateus, Nassir Navab
STOC
2007
ACM
142views Algorithms» more  STOC 2007»
14 years 10 months ago
Lower bounds for randomized read/write stream algorithms
Motivated by the capabilities of modern storage architectures, we consider the following generalization of the data stream model where the algorithm has sequential access to multi...
Paul Beame, T. S. Jayram, Atri Rudra
QUESTA
2002
87views more  QUESTA 2002»
13 years 9 months ago
A Communication Multiplexer Problem: Two Alternating Queues with Dependent Randomly-Timed Gated Regime
Two random traffic streams are competing for the service time of a single server (multiplexer). The streams form two queues, primary (queue 1) and secondary (queue 0). The primary ...
Iddo Eliazar, Gadi Fibich, Uri Yechiali
ECRIME
2007
14 years 1 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...