This paper moves from the affinities between two well-known learning schemes that apply randomization in the training process, namely, Extreme Learning Machines (ELMs) and the learning framework using similarity functions. These paradigms share a common approach involving data remapping and linear separators, but differ in the role of...
-
2016 (v1)PublicationUploaded on: April 14, 2023
-
2014 (v1)Publication
Every minute more than 320 new accounts are created on Twitter and more than 98,000 tweets are posted. Among the multitude of Twitter users, spammers and cybercriminals aim to pervade and strike legitimate users' accounts with a large amount of troublesome messages. Hence, the Social Network propagation opens new modalities for cyber-crime...
Uploaded on: April 14, 2023 -
2016 (v1)Publication
This research shows that inductive bias provides a valuable method to effectively tackle semi-supervised classification problems. In the learning theory framework, inductive bias provides a powerful tool, and allows one to shape the generalization properties of a learning machine. The paper formalizes semisupervised learning as a supervised...
Uploaded on: March 27, 2023 -
2015 (v1)Publication
This paper explores the theory of learning with similarity functions in the context of common-sense reasoning and natural language processing. Based on this theory, the proposed approach (called Sim-Predictor) is characterized by the process of remapping the input space into a new space which is able to convey the similarity between the input...
Uploaded on: March 27, 2023 -
2016 (v1)Publication
This research analyzes the affinities between two well-known learning schemes that apply randomization in the training process, namely, Extreme Learning Machines (ELMs) and the learning framework using similarity functions. These paradigms share a common approach to inductive learning, which combines an explicit data remapping with a linear...
Uploaded on: April 14, 2023 -
2016 (v1)Publication
In the Internet age, malicious software (malware) represents a serious threat to the security of information systems. Malware-detection systems to protect computers must perform a real-time analysis of the executable files. The paper shows that machine-learning methods can support the challenging, yet critical, task of unseen malware...
Uploaded on: March 27, 2023 -
2016 (v1)Publication
Sentiment analysis research has acquired a growing importance due to its applications in several different fields. A large number of companies have included the analysis of opinions and sentiments of costumers as a part of their mission. Therefore, the analysis and automatic classification of large corpora of documents in natural language,...
Uploaded on: April 14, 2023