Sciweavers

KDD
2010
ACM
249views Data Mining» more  KDD 2010»
13 years 10 months ago
Semi-supervised sparse metric learning using alternating linearization optimization
In plenty of scenarios, data can be represented as vectors mathematically abstracted as points in a Euclidean space. Because a great number of machine learning and data mining app...
Wei Liu, Shiqian Ma, Dacheng Tao, Jianzhuang Liu, ...
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 10 months ago
Active learning for biomedical citation screening
Active learning (AL) is an increasingly popular strategy for mitigating the amount of labeled data required to train classifiers, thereby reducing annotator effort. We describe ...
Byron C. Wallace, Kevin Small, Carla E. Brodley, T...
INCDM
2010
Springer
248views Data Mining» more  INCDM 2010»
13 years 10 months ago
Aircraft Engine Health Monitoring Using Self-Organizing Maps
Etienne Côme, Marie Cottrell, Michel Verleys...
INCDM
2010
Springer
125views Data Mining» more  INCDM 2010»
13 years 10 months ago
Web-Site Boundary Detection
Defining the boundaries of a web-site, for (say) archiving or information retrieval purposes, is an important but complicated task. In this paper a web-page clustering approach to...
Ayesh Alshukri, Frans Coenen, Michele Zito
INCDM
2010
Springer
308views Data Mining» more  INCDM 2010»
13 years 10 months ago
Data Mining with Neural Networks and Support Vector Machines Using the R/rminer Tool
We present rminer, our open source library for the R tool that facilitates the use of data mining (DM) algorithms, such as neural Networks (NNs) and support vector machines (SVMs),...
Paulo Cortez
INCDM
2010
Springer
134views Data Mining» more  INCDM 2010»
13 years 10 months ago
Moving Targets
Giorgio Giacinto
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
AUSDM
2008
Springer
199views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Kernel-based Visualisation of Genes with the Gene Ontology
With the development of microarray
Hamid Ghous, Paul J. Kennedy, Daniel R. Catchpoole...
AUSDM
2008
Springer
367views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Categorical Proportional Difference: A Feature Selection Method for Text Categorization
Supervised text categorization is a machine learning task where a predefined category label is automatically assigned to a previously unlabelled document based upon characteristic...
Mondelle Simeon, Robert J. Hilderman