In this article we will look at a supervised machine learning algorithm called Logistic Regression Classifier for multi-class classification .; Author: pi19404; Updated: 29 Sep 2014; Section: Algorithms & Recipes; Chapter: General Programming; Updated: 29 Sep 2014
Sensitivity (also called recall rate in some fields) measures the proportion of actual positives which are correctly identified as such (e.g. the percentage of sick people who are correctly identified as having the condition). Specificity measures the proportion of negatives which are correctly identified (e.g. the percentage of healthy people who are correctly identified as not having the condition).
This project contains Naive and Fishers bayesian classifiers, as described in Toby Segaran's book "Programming Collective Intelligence." The book has python implementations; this is a Java implementation.
ci-bayes, a project hosted on java.net, has released its first stable version. ci-bayes allows the use of a classifier to determine what classification a given object might fall into, given prior training, and provides multiple
Libtextcat is a library with functions that implement the classification technique described in Cavnar & Trenkle, "N-Gram-Based Text Categorization" [1]. It was primarily developed for language guessing, a task on which it is known to perform with near-pe
M. Zimmermann, E. Ntoutsi, and M. Spiliopoulou. Proceedings of the 2014 IEEE 14th International Conference on Data Mining Workshops, Washington, DC, USA, IEEE Computer Society, (2014)accepted, to appear December 2014.
K. McCarthy, B. Zabar, and G. Weiss. Proceedings of the 1st international workshop on Utility-based data mining, page 69--77. New York, NY, USA, ACM, (2005)
K. Lee, J. Caverlee, and S. Webb. Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval, page 435--442. New York, NY, USA, ACM, (2010)
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), (July 2010)
A. Wang. Data and Applications Security and Privacy XXIV, volume 6166 of Lecture Notes in Computer Science, chapter 25, Springer Berlin / Heidelberg, Berlin, Heidelberg, (2010)
A. Wang. Data and Applications Security and Privacy XXIV, volume 6166 of Lecture Notes in Computer Science, chapter 25, Springer Berlin / Heidelberg, Berlin, Heidelberg, (2010)
K. Lee, J. Caverlee, and S. Webb. Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval, page 435--442. New York, NY, USA, ACM, (2010)
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), (July 2010)
K. Boyer, E. Ha, R. Phillips, M. Wallis, M. Vouk, and J. Lester. Proceedings of the 11th Annual Meeting of the Special Interest Group on Discourse and Dialogue, page 297--305. Stroudsburg, PA, USA, Association for Computational Linguistics, (2010)
R. Kanawati, and M. Malek. AAMAS '02: Proceedings of the first international joint conference on Autonomous agents and multiagent systems, page 1137--1138. New York, NY, USA, ACM Press, (2002)
T. Yoshimi, and T. Taura. Proceedings of the Genetic and Evolutionary
Computation Conference, 1, page 758--766. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)