Sciweavers

AND
2010
13 years 9 months ago
Reshaping automatic speech transcripts for robust high-level spoken document analysis
High-level spoken document analysis is required in many applications seeking access to the semantic content of audio data, such as information retrieval, machine translation or au...
Julien Fayolle, Fabienne Moreau, Christian Raymond...
SEAL
2010
Springer
13 years 10 months ago
Bayesian Reliability Analysis under Incomplete Information Using Evolutionary Algorithms
During engineering design, it is often difficult to quantify product reliability because of insufficient data or information for modeling the uncertainties. In such cases, one need...
Rupesh Kumar Srivastava, Kalyanmoy Deb
SEAL
2010
Springer
13 years 10 months ago
Generating Sequential Space-Filling Designs Using Genetic Algorithms and Monte Carlo Methods
In this paper, the authors compare a Monte Carlo method and an optimization-based approach using genetic algorithms for sequentially generating space-filling experimental designs....
Karel Crombecq, Tom Dhaene
ML
2010
ACM
124views Machine Learning» more  ML 2010»
13 years 10 months ago
Large scale image annotation: learning to rank with joint word-image embeddings
Image annotation datasets are becoming larger and larger, with tens of millions of images and tens of thousands of possible annotations. We propose a strongly performing method tha...
Jason Weston, Samy Bengio, Nicolas Usunier
ML
2010
ACM
141views Machine Learning» more  ML 2010»
13 years 10 months ago
Relational retrieval using a combination of path-constrained random walks
Scientific literature with rich metadata can be represented as a labeled directed graph. This graph representation enables a number of scientific tasks such as ad hoc retrieval o...
Ni Lao, William W. Cohen
ML
2010
ACM
142views Machine Learning» more  ML 2010»
13 years 10 months ago
Graph regularization methods for Web spam detection
We present an algorithm, witch, that learns to detect spam hosts or pages on the Web. Unlike most other approaches, it simultaneously exploits the structure of the Web graph as wel...
Jacob Abernethy, Olivier Chapelle, Carlos Castillo
ML
2010
ACM
126views Machine Learning» more  ML 2010»
13 years 10 months ago
The security of machine learning
Marco Barreno, Blaine Nelson, Anthony D. Joseph, J...
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 10 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
ML
2010
ACM
127views Machine Learning» more  ML 2010»
13 years 10 months ago
Stability and model selection in k-means clustering
Abstract Clustering Stability methods are a family of widely used model selection techniques for data clustering. Their unifying theme is that an appropriate model should result in...
Ohad Shamir, Naftali Tishby
ML
2010
ACM
115views Machine Learning» more  ML 2010»
13 years 10 months ago
Preference-based learning to rank
Nir Ailon, Mehryar Mohri