Sciweavers

70 search results - page 3 / 14
» A consensus based approach to constrained clustering of soft...
Sort
View
KBSE
2008
IEEE
14 years 5 days ago
Automated Aspect Recommendation through Clustering-Based Fan-in Analysis
Identifying code implementing a crosscutting concern (CCC) automatically can benefit the maintainability and evolvability of the application. Although many approaches have been p...
Danfeng Zhang, Yao Guo, Xiangqun Chen
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 18 days ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
SIGIR
2009
ACM
14 years 8 days ago
A comparison of retrieval-based hierarchical clustering approaches to person name disambiguation
This paper describes a simple clustering approach to person name disambiguation of retrieved documents. The methods are based on standard IR concepts and do not require any task-s...
Christof Monz, Wouter Weerkamp
CIKM
2010
Springer
13 years 4 months ago
Multi-view clustering with constraint propagation for learning with an incomplete mapping between views
Multi-view learning algorithms typically assume a complete bipartite mapping between the different views in order to exchange information during the learning process. However, ma...
Eric Eaton, Marie desJardins, Sara Jacob
DCC
1995
IEEE
13 years 9 months ago
Constrained-Storage Vector Quantization with a Universal Codebook
— Many image compression techniques require the quantization of multiple vector sources with significantly different distributions. With vector quantization (VQ), these sources ...
Sangeeta Ramakrishnan, Kenneth Rose, Allen Gersho