Sciweavers

8381 search results - page 1646 / 1677
» The security of machine learning
Sort
View
ACL
2003
13 years 8 months ago
Recognizing Expressions of Commonsense Psychology in English Text
Many applications of natural language processing technologies involve analyzing texts that concern the psychological states and processes of people, including their beliefs, goals...
Andrew Gordon, Abe Kazemzadeh, Anish Nair, Milena ...
CIDR
2003
106views Algorithms» more  CIDR 2003»
13 years 8 months ago
Speculative Query Processing
Speculation is an every day phenomenon whereby one acts in anticipation of particular conditions that are likely to hold in the future. Computer science research has seen many suc...
Neoklis Polyzotis, Yannis E. Ioannidis
IJIT
2004
13 years 8 months ago
Computing Entropy for Ortholog Detection
Abstract-- Biological sequences from different species are called orthologs if they evolved from a sequence of a common ancestor species and they have the same biological function....
Hsing-Kuo Pao, John Case
NIPS
2004
13 years 8 months ago
Confidence Intervals for the Area Under the ROC Curve
In many applications, good ranking is a highly desirable performance for a classifier. The criterion commonly used to measure the ranking quality of a classification algorithm is ...
Corinna Cortes, Mehryar Mohri
TREC
2004
13 years 8 months ago
Feature Generation, Feature Selection, Classifiers, and Conceptual Drift for Biomedical Document Triage
We approached the problem of classifying papers for the TREC 2004 Genomics Track triage task as a four step process: feature generation, feature selection, classifier training, an...
Aaron M. Cohen, Ravi Teja Bhupatiraju, William R. ...
« Prev « First page 1646 / 1677 Last » Next »