Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,700 papers from all fields of science
Search
Sign In
Create Free Account
Feature hashing
Known as:
Hash trick
, Hashtrick
, Hashing trick
Expand
In machine learning, feature hashing, also known as the hashing trick (by analogy to the kernel trick), is a fast and space-efficient way of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Apache Mahout
Apache Spark
Bloom filter
Count–min sketch
Expand
Broader (1)
Machine learning
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Real-Time Detection of Fall From Bed Using a Single Depth Camera
Feng Zhao
,
ZHIGUO CAO
,
Yang Xiao
,
Jingjing Mao
,
Junsong Yuan
IEEE Transactions on Automation Science and…
2019
Corpus ID: 59298827
Toward the medical and living healthcare for the elderly and patients, fall from bed is a critical accident that may lead to…
Expand
2019
2019
A scalable and extensible framework for android malware detection and family attribution
Li Zhang
,
V. Thing
,
Yao Cheng
Computers & security
2019
Corpus ID: 57379448
2018
2018
MISSION: Ultra Large-Scale Feature Selection using Count-Sketches
Amirali Aghazadeh
,
Ryan Spring
,
Daniel LeJeune
,
Gautam Dasarathy
,
Anshumali Shrivastava
,
Richard Baraniuk
International Conference on Machine Learning
2018
Corpus ID: 48362082
Feature selection is an important challenge in machine learning. It plays a crucial role in the explainability of machine-driven…
Expand
2016
2016
Malware provenance: code reuse detection in malicious software at scale
Jason Upchurch
,
Xiaobo Zhou
International Conference on Malicious and…
2016
Corpus ID: 6564565
Detecting code reuse in software has applications in malicious code analysis and in malware code search and retrieval, but is…
Expand
2016
2016
Fast trajectory clustering using Hashing methods
Iván Sánchez
,
Zay Maung Maung Aye
,
Benjamin I. P. Rubinstein
,
K. Ramamohanarao
IEEE International Joint Conference on Neural…
2016
Corpus ID: 17076817
There has been an explosion in the usage of trajectory data. Clustering is one of the simplest and most powerful approaches for…
Expand
2014
2014
Evidence for a global access deficit to the meaning of numerical symbols in people with Williams syndrome.
Laurence Rousselle
,
Marie-Pascale Noël
2014
Corpus ID: 147056389
They showed a smaller subitizing range in accordance to what would be expected on the basis or their visuo-spatial capacities…
Expand
Highly Cited
2012
Highly Cited
2012
The Best of Both Worlds – A Graph-based Completion Model for Transition-based Parsers
Bernd Bohnet
,
Jonas Kuhn
Conference of the European Chapter of the…
2012
Corpus ID: 14038100
Transition-based dependency parsers are often forced to make attachment decisions at a point when only partial information about…
Expand
2011
2011
Gangsters, Pranksters, and the Invention of Trick-or-Treating, 1930-1960.
Samira Kawash
2011
Corpus ID: 141525993
For most children in North America, Halloween is one of the most exciting holidays of the year. But some critics insist that its…
Expand
2010
2010
Real-time Visual Tracking Using Sparse Representation
Hanxi Li
,
Chunhua Shen
,
Javen Qinfeng Shi
Computer Vision and Pattern Recognition
2010
Corpus ID: 8908301
The $\ell_1$ tracker obtains robustness by seeking a sparse representation of the tracking object via $\ell_1$ norm minimization…
Expand
Highly Cited
2009
Highly Cited
2009
Collaborative Email-Spam Filtering with the Hashing-Trick
Josh Attenberg
,
Kilian Q. Weinberger
,
A. Dasgupta
,
Alex Smola
,
Martin A. Zinkevich
2009
Corpus ID: 62758715
This paper delves into a recently proposed technique for collaborative spam ltering [7] that facilitates personalization
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE