Default Cover Image

2006 International Conference on Machine Learning and Applications

Dec. 14 2006 to Dec. 16 2006

Orlando, FL

Table of Contents

Introduction
PrefaceFreely available from IEEE.pp. ix
Introduction
Conference CommitteesFreely available from IEEE.pp. x
Introduction
Program CommitteesFreely available from IEEE.pp. xi
Session 1: Inductive and Machine Learning Classifiers
Condition Monitoring Using Pattern Recognition Techniques on Data from Acoustic EmissionsFull-text access may be available. Sign in or learn about subscription options.pp. 3-9
Session 1: Inductive and Machine Learning Classifiers
A New Machine Learning Technique Based on Straight Line SegmentsFull-text access may be available. Sign in or learn about subscription options.pp. 10-16
Session 1: Inductive and Machine Learning Classifiers
Horizon Detection Using Machine Learning TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 17-21
Session 1: Inductive and Machine Learning Classifiers
Rule Extraction from Opaque Models-- A Slightly Different PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 22-27
Session 1: Inductive and Machine Learning Classifiers
Off-Line Signature Recognition and Verification by Kernel Principal Component Self-RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Session 1: Inductive and Machine Learning Classifiers
Naive Bayes Classification Given Probability Estimation TreesFull-text access may be available. Sign in or learn about subscription options.pp. 34-42
Session 2: Learning
An Efficient Heuristic for Discovering Multiple Ill-Defined Attributes in DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 43-47
Session 2: Learning
Lazy Rule Refinement by Knowledge-Based AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 48-54
Session 2: Learning
Semi-supervised Data Organization for Interactive Anomaly Analysis.Full-text access may be available. Sign in or learn about subscription options.pp. 55-62
A Comparison of Software Fault Imputation ProceduresFull-text access may be available. Sign in or learn about subscription options.pp. 135-142
Session 2: Learning
Incremental Learning By DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Session 2: Learning
Market Mechanism Designs with Heterogeneous Trading AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 69-76
Session 3: Support Vector Machines
Supernova Recognition Using Support Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
Session 3: Support Vector Machines
On L_1-Norm Multi-class Support Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Session 3: Support Vector Machines
Two-Level Hierarchical Hybrid SVM-RVM Classification ModelFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
Session 3: Support Vector Machines
Modeling Hesitation and Conflict: A Belief-Based Approach for Multi-class ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 95-100
Session 3: Support Vector Machines
Shape Recognition and Retrieval Using String of SymbolsFull-text access may be available. Sign in or learn about subscription options.pp. 101-108
Session 4: Applications
Intelligent Electronic Navigational Aids: A New ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 109-116
Session 4: Applications
Application of Reinforcement Learning in Development of a New Adaptive Intelligent Traffic ShaperFull-text access may be available. Sign in or learn about subscription options.pp. 117-122
Session 4: Applications
Regression Databases: Probabilistic Querying Using Sparse Learning SetsFull-text access may be available. Sign in or learn about subscription options.pp. 123-128
Session 4: Applications
Explaining Winning Poker--A Data Mining ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Session 4: Applications
Formal Concept Analysis for Digital EcosystemFull-text access may be available. Sign in or learn about subscription options.pp. 143-148
Session 4: Applications
Web Robot Learning Powered by Bluetooth Communication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 149-156
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
An Accurate and Robust Missing Value Estimation for Microarray Data: Least Absolute Deviation ImputationFull-text access may be available. Sign in or learn about subscription options.pp. 157-161
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
A New Scheme for Nucleotide Sequence Signature ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
A Feature Selection Algorithm for Detecting Subtype Specific Functional Sites from Protein Sequences for Smad Receptor BindingFull-text access may be available. Sign in or learn about subscription options.pp. 168-173
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
Automatic Intravital Video Mining of Rolling and Adhering LeukocytesFull-text access may be available. Sign in or learn about subscription options.pp. 174-179
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
Impact of the Predicted Protein Structural Content on Prediction of Structural Classes for the Twilight Zone ProteinsFull-text access may be available. Sign in or learn about subscription options.pp. 180-186
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
Quantization of Global Gene Expression DataFull-text access may be available. Sign in or learn about subscription options.pp. 187-192
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
Robust Model Selection Using Cross Validation: A Simple Iterative Technique for Developing Robust Gene Signatures in Biomedical Genomics ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 193-198
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
Prediction of Antisense Oligonucleotide Efficacy Using Local and Global Structure Information with Support Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 199-204
Session 5: Applications in Medicine, Bioinformatics, and Computational Biology
Information of Binding Sites Improves Prediction of Protein-Protein InteractionFull-text access may be available. Sign in or learn about subscription options.pp. 205-212
Session 6: Evolutionary Methods and Neural Networks
An Adaptable Time Warping Distance for Time Series LearningFull-text access may be available. Sign in or learn about subscription options.pp. 213-218
Session 6: Evolutionary Methods and Neural Networks
Introducing Emergent Loose Modules into the Learning Process of a Linear Genetic Programming SystemFull-text access may be available. Sign in or learn about subscription options.pp. 219-224
Session 6: Evolutionary Methods and Neural Networks
Ensemble Classifiers for Medical Diagnosis of Knee Osteoarthritis Using Gait DataFull-text access may be available. Sign in or learn about subscription options.pp. 225-230
Session 6: Evolutionary Methods and Neural Networks
An Intelligent Automatic Fingerprint Recognition System DesignFull-text access may be available. Sign in or learn about subscription options.pp. 231-238
Session 7: Feature Extraction, Selection and Clustering
An Approximate Version of Kernel PCAFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Session 7: Feature Extraction, Selection and Clustering
Reducing High-Dimensional Data by Principal Component Analysis vs. Random Projection for Nearest Neighbor ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 245-250
Session 7: Feature Extraction, Selection and Clustering
A Fast Feature Selection Model for Online Handwriting Symbol RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 251-257
Session 7: Feature Extraction, Selection and Clustering
TF-ICF: A New Term Weighting Scheme for Clustering Dynamic Data StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 258-263
Session 7: Feature Extraction, Selection and Clustering
A Printing Workflow Recommendation Tool--Exploiting Correlations between Highly Sparse Case LogsFull-text access may be available. Sign in or learn about subscription options.pp. 264-269
Session 7: Feature Extraction, Selection and Clustering
Learning the Threshold in Hierarchical Agglomerative ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 270-278
Session 8: Text and Multimedia Learning
Detecting Web Content Function Using Generalized Hidden Markov ModelFull-text access may be available. Sign in or learn about subscription options.pp. 279-284
Session 8: Text and Multimedia Learning
Trend Analysis for Large Document StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 285-295
Session 8: Text and Multimedia Learning
Identity Representability of Facial Expressions: An Evaluation Using Feature Pixel DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Author Index
Author IndexFreely available from IEEE.pp. 302-303
Showing 52 out of 52