Sciweavers

8381 search results - page 1640 / 1677
» The security of machine learning
Sort
View
AIME
2009
Springer
14 years 3 months ago
Prediction of Mechanical Lung Parameters Using Gaussian Process Models
Abstract. Mechanical ventilation can cause severe lung damage by inadequate adjustment of the ventilator. We introduce a Machine Learning approach to predict the pressure-dependent...
Steven Ganzert, Stefan Kramer, Knut Möller, D...
CIKM
2009
Springer
14 years 3 months ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
IPPS
2000
IEEE
14 years 3 months ago
PaDDMAS: Parallel and Distributed Data Mining Application Suite
Discovering complex associations, anomalies and patterns in distributed data sets is gaining popularity in a range of scientific, medical and business applications. Various algor...
Omer F. Rana, David W. Walker, Maozhen Li, Steven ...
PODS
1999
ACM
151views Database» more  PODS 1999»
14 years 3 months ago
Exact and Approximate Aggregation in Constraint Query
We investigate the problem of how to extend constraint query languages with aggregate operators. We deal with standard relational aggregation, and also with aggregates speci c to ...
Michael Benedikt, Leonid Libkin
DL
1998
Springer
111views Digital Library» more  DL 1998»
14 years 3 months ago
SONIA: A Service for Organizing Networked Information Autonomously
The recent explosion of on-line information in Digital Libraries and on the World Wide Web has given rise to a number of query-based search engines and manually constructed topica...
Mehran Sahami, Salim Yusufali, Michelle Q. Wang Ba...
« Prev « First page 1640 / 1677 Last » Next »