Sciweavers

562 search results - page 96 / 113
» Supervised Machine Learning: A Review of Classification Tech...
Sort
View
CCS
2008
ACM
13 years 11 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
ICPR
2008
IEEE
14 years 3 months ago
Grading nuclear pleomorphism on histological micrographs
A mainstay in cancer diagnostics is the classification or grading of cell nuclei based on their appearance. While the analysis of cytological samples has been automated successful...
Eric Cosatto, Matthew Miller, Hans Peter Graf, Joh...
NOSSDAV
2009
Springer
14 years 3 months ago
Rapid identification of Skype traffic flows
In this paper we present results of experimental work using machine learning techniques to rapidly identify Skype traffic. We show that Skype traffic can be identified by observin...
Philip Branch, Amiel Heyde, Grenville J. Armitage
ESWA
2008
134views more  ESWA 2008»
13 years 7 months ago
Neighborhood classifiers
K nearest neighbor classifier (K-NN) is widely discussed and applied in pattern recognition and machine learning, however, as a similar lazy classifier using local information for...
Qinghua Hu, Daren Yu, Zongxia Xie
ICPR
2010
IEEE
14 years 3 days ago
Feature Selection Using Multiobjective Optimization for Named Entity Recognition
Appropriate feature selection is a very crucial issue in any machine learning framework, specially in Maximum Entropy (ME). In this paper, the selection of appropriate features for...
Asif Ekbal, Sriparna Saha