Sciweavers

17 search results - page 3 / 4
» Analyzing OSS developers' working time using mailing lists a...
Sort
View
CORR
2010
Springer
268views Education» more  CORR 2010»
13 years 4 months ago
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or c...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
CVPR
2005
IEEE
13 years 10 months ago
A Slit Scanning Depth of Route Panorama from Stationary Blur
This work achieves an efficient acquisition of scenes and their depths along streets. During the movement of a vehicle, a slit in the camera frame is set properly to sample scenes...
Min Shi, Jiang Yu Zheng
WOSP
2005
ACM
13 years 10 months ago
Performance evaluation of UML software architectures with multiclass Queueing Network models
Software performance based on performance models can be applied at early phases of the software development cycle to characterize the quantitative behavior of software systems. We...
Simonetta Balsamo, Moreno Marzolla
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
14 years 5 months ago
Sequential cost-sensitive decision making with reinforcement learning
Recently, there has been increasing interest in the issues of cost-sensitive learning and decision making in a variety of applications of data mining. A number of approaches have ...
Edwin P. D. Pednault, Naoki Abe, Bianca Zadrozny
IWMM
1998
Springer
130views Hardware» more  IWMM 1998»
13 years 9 months ago
Comparing Mostly-Copying and Mark-Sweep Conservative Collection
Many high-level language compilers generate C code and then invoke a C compiler for code generation. To date, most of these compilers link the resulting code against a conservativ...
Frederick Smith, J. Gregory Morrisett