Sciweavers

562 search results - page 109 / 113
» Supervised Machine Learning: A Review of Classification Tech...
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 1 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
IJIS
2008
123views more  IJIS 2008»
13 years 7 months ago
Algorithms of nonlinear document clustering based on fuzzy multiset model
Abstract: Fuzzy multiset is applicable as a model of information retrieval because it has the mathematical structure which expresses the number and the degree of attribution of an ...
Kiyotaka Mizutani, Ryo Inokuchi, Sadaaki Miyamoto
NECO
2006
157views more  NECO 2006»
13 years 7 months ago
Experiments with AdaBoost.RT, an Improved Boosting Scheme for Regression
The application of boosting technique to the regression problems has received relatively little attention in contrast to the research aimed at classification problems. This paper ...
Durga L. Shrestha, Dimitri P. Solomatine
PRL
2008
246views more  PRL 2008»
13 years 7 months ago
Automatic medical image annotation in ImageCLEF 2007: Overview, results, and discussion
In this paper, the automatic medical annotation task of the 2007 CLEF cross-language image retrieval campaign (ImageCLEF) is described. The paper focusses on the images used, the ...
Thomas Deselaers, Thomas Martin Deserno, Henning M...
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
14 years 8 months ago
Identifying "best bet" web search results by mining past user behavior
The top web search result is crucial for user satisfaction with the web search experience. We argue that the importance of the relevance at the top position necessitates special h...
Eugene Agichtein, Zijian Zheng