Sciweavers

1648 search results - page 174 / 330
» Training Data Selection for Support Vector Machines
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 3 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICTAI
2006
IEEE
14 years 3 months ago
Modeling and Recognition of Gesture Signals in 2D Space: A Comparison of NN and SVM Approaches
In this paper we introduce a novel technique for modeling and recognizing gesture signals in 2D space. This technique is based on measuring the direction of the gradient of the mo...
Farhad Dadgostar, Abdolhossein Sarrafzadeh, Chao F...
SAC
2006
ACM
14 years 3 months ago
Protein classification using transductive learning on phylogenetic profiles
Phylogenetic profiles of proteins − strings of ones and zeros encoding respectively the presence and absence of proteins in a group of genomes − have recently been used to iden...
Roger A. Craig, Li Liao
KDD
2010
ACM
175views Data Mining» more  KDD 2010»
14 years 1 months ago
Learning with cost intervals
Existing cost-sensitive learning methods work with unequal misclassification cost that is given by domain knowledge and appears as precise values. In many real-world applications,...
Xu-Ying Liu, Zhi-Hua Zhou
DMIN
2006
122views Data Mining» more  DMIN 2006»
13 years 10 months ago
Cost-Sensitive Analysis in Multiple Time Series Prediction
- In this paper we propose a new methodology for Cost-Benefit analysis in a multiple time series prediction problem. The proposed model is evaluated in a real world application bas...
Chamila Walgampaya, Mehmed M. Kantardzic