Default Cover Image

2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)

Dec. 18 2016 to Dec. 20 2016

Anaheim, CA

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xvii
PrefaceFreely available from IEEE.pp. xviii-xix
Organizing CommitteeFreely available from IEEE.pp. xx-xx
Program CommitteeFreely available from IEEE.pp. xxi-xxiii
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xxiv-xxix
Improved Time Series Classification with Representation Diversity and SVMFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Iterative Grammar-Based Framework for Discovering Variable-Length Time Series MotifsFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Dynamic Factor Mixture of Experts for Functional Time Series ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 19-25
Automatic Optimization of Localized Kernel Density Estimation for Hotspot PolicingFull-text access may be available. Sign in or learn about subscription options.pp. 32-38
Robust Kernel Embedding of Conditional and Posterior Distributions with ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 39-44
Conformalized Kernel Ridge RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 45-52
Automated Optimal Architecture of Deep Convolutional Neural Networks for Image RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
Infrared Colorization Using Deep Convolutional Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
Assessing Threat of Adversarial Examples on Deep Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
Correlating Filter Diversity with Convolutional Neural Network AccuracyFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
Interaction Network Representations for Human Behavior PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 87-93
Predicting Future Agent Motions for Dynamic EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
Demographic Group Prediction Based on Smart Device User Recognition GesturesFull-text access may be available. Sign in or learn about subscription options.pp. 100-107
Cross-Document Knowledge Discovery Using Semantic Concept Topic ModelFull-text access may be available. Sign in or learn about subscription options.pp. 108-114
Domain Ontology Induction Using Word EmbeddingsFull-text access may be available. Sign in or learn about subscription options.pp. 115-119
Latent Topic-Semantic Indexing Based Automatic Text SummarizationFull-text access may be available. Sign in or learn about subscription options.pp. 120-126
An Investigation of Ensemble Techniques for Detection of Spam ReviewsFull-text access may be available. Sign in or learn about subscription options.pp. 127-133
A Re-estimation Brain Storm Optimization to Train Hidden Markov Model for Transcription Factor Binding Site AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
Inferring Gene Regulatory Networks by Combining Supervised and Unsupervised MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 140-145
Bag of Bags: Nested Multi Instance Classification for Prostate Cancer DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
Decoding Epileptogenesis in a Reduced State SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
Machine Learning for Plant Disease Incidence and Severity Measurements from Leaf ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 158-163
Exposing Inpainting Forgery in JPEG Images under Recompression AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 164-169
Automatic Species Recognition Based on Improved Birdsong AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 176-181
ECG Biometric Identification Using Wavelet Analysis Coupled with Probabilistic Random ForestFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
A Multifaceted Approach to Bitcoin Fraud Detection: Global and Local OutliersFull-text access may be available. Sign in or learn about subscription options.pp. 188-194
Toward an Online Anomaly Intrusion Detection System Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 195-200
Android Malware Detection: Building Useful RepresentationsFull-text access may be available. Sign in or learn about subscription options.pp. 201-206
Investigating Transfer Learners for Robustness to Domain Class ImbalanceFull-text access may be available. Sign in or learn about subscription options.pp. 207-213
Learning Fairness under Constraints: A Decentralized Resource Allocation GameFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Bayesian Unification of Gradient and Bandit-Based Learning for Accelerated Global OptimisationFull-text access may be available. Sign in or learn about subscription options.pp. 222-226
Are Accuracy and Robustness CorrelatedFull-text access may be available. Sign in or learn about subscription options.pp. 227-232
Advanced Image Classification Using Wavelets and Convolutional Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 233-239
Consensus Clustering: A Resampling-Based Method for Building Radiation Hybrid MapsFull-text access may be available. Sign in or learn about subscription options.pp. 240-245
An LED Based Indoor Localization System Using k-Means ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 246-252
Distributed Conformal Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
Phase Identification in Electric Power Distribution Systems by Clustering of Smart Meter DataFull-text access may be available. Sign in or learn about subscription options.pp. 259-265
Density-Based Data Pruning Method for Deep Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
A Next-Generation Secure Cloud-Based Deep Learning License Plate Recognition for Smart CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 286-293
Energy Efficient EEG Monitoring System for Wireless Epileptic Seizure DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 294-299
Improving HSDPA Traffic Forecasting Using Ensemble of Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Nonlinear Metric Learning for Semi-Supervised Learning via Coherent Point DriftingFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
L1-Norm Principal-Component Analysis via Bit FlippingFull-text access may be available. Sign in or learn about subscription options.pp. 326-332
Event Based Weight Update for Learning Infinite Spike TrainFull-text access may be available. Sign in or learn about subscription options.pp. 333-338
A Probabilistic Programming Approach for Outlier Detection in Healthcare ClaimsFull-text access may be available. Sign in or learn about subscription options.pp. 347-354
Automatic Algorithm Selection in Computational Software Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
System-Level Test Case Prioritization Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 361-368
Detecting Smooth Cluster Changes in Evolving GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 369-374
A Privacy-Preserving Solution for the Bipartite Ranking ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 375-380
Temporal Link Prediction Using Time Series of Quasi-Local Node Similarity MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 381-386
DERIV: Distributed In-Memory Brand Perception Tracking FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 387-393
Recommendation Model Based on a Contextual Similarity MeasureFull-text access may be available. Sign in or learn about subscription options.pp. 394-401
Course Learning Outcome Performance Improvement: A Remedial Action Classification Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 408-413
A Formal Design for the Lexical and Syntax Analyzer of a Pedagogically Effective Subset of C++Full-text access may be available. Sign in or learn about subscription options.pp. 420-425
Classifying Educational Lectures in Low-Resource LanguagesFull-text access may be available. Sign in or learn about subscription options.pp. 431-435
k-Means Partition of Monthly Average Insolation Period Data for TurkeyFull-text access may be available. Sign in or learn about subscription options.pp. 436-440
Hourly Solar Irradiance Forecasting Based on Machine Learning ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 441-446
Enhanced Approach to Detection of SQL Injection AttackFull-text access may be available. Sign in or learn about subscription options.pp. 466-469
Towards Web Spam Filtering Using a Classifier Based on the Minimum Description Length PrincipleFull-text access may be available. Sign in or learn about subscription options.pp. 470-475
Early Identification of Vulnerable Software Components via Ensemble LearningFull-text access may be available. Sign in or learn about subscription options.pp. 476-481
Building a Platform for Software-Defined Networking Cybersecurity ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 482-487
Identifying Gender from SMS Text MessagesFull-text access may be available. Sign in or learn about subscription options.pp. 488-491
Security Perspective of Biometric Recognition and Machine Learning TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 492-497
A Web Based Pipeline Tool for the Combination of Logic Conditions for NGS DataFull-text access may be available. Sign in or learn about subscription options.pp. 498-501
A Parallel K-Medoids Algorithm for Clustering based on MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 502-507
A Big Data Analytics Framework for Supporting Multidimensional Mining over Big Healthcare DataFull-text access may be available. Sign in or learn about subscription options.pp. 508-513
Hedonic Housing Theory — A Machine Learning InvestigationFull-text access may be available. Sign in or learn about subscription options.pp. 522-527
Feedforward Neural Networks for Predicting the Duration of Maintained Software ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 528-533
Equipment Condition Diagnosis and Fault Fingerprint Extraction in Semiconductor ManufacturingFull-text access may be available. Sign in or learn about subscription options.pp. 534-539
A Hybrid Machine Learning Approach for Planning Safe Trajectories in Complex Traffic-ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 540-546
Efficient Content Replacement in Wireless Content Delivery Network with Cooperative CachingFull-text access may be available. Sign in or learn about subscription options.pp. 547-552
Spatial Dependency and Hedonic Housing Regression ModelFull-text access may be available. Sign in or learn about subscription options.pp. 553-558
A Novel Algorithm for Dynamic Clustering: Properties and PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 565-570
User Movement Prediction: The Contribution of Machine Learning TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 571-575
Showing 100 out of 196