Sciweavers

26 search results - page 4 / 6
» Mining additions of method calls in ArgoUML
Sort
View
INFOCOM
2010
IEEE
13 years 4 months ago
Bayesian Inference for Localization in Cellular Networks
—In this paper, we present a general technique based on Bayesian inference to locate mobiles in cellular networks. We study the problem of localizing users in a cellular network ...
Hui Zang, François Baccelli, Jean Bolot
SIGSOFT
2005
ACM
13 years 11 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou
DMIN
2009
132views Data Mining» more  DMIN 2009»
13 years 3 months ago
Understanding Support Vector Machine Classifications via a Recommender System-Like Approach
Support vector machines are a valuable tool for making classifications, but their black-box nature means that they lack the natural explanatory value that many other classifiers po...
David Barbella, Sami Benzaid, Janara M. Christense...
ICDM
2008
IEEE
137views Data Mining» more  ICDM 2008»
14 years 6 days ago
Iterative Set Expansion of Named Entities Using the Web
Set expansion refers to expanding a partial set of “seed” objects into a more complete set. One system that does set expansion is SEAL (Set Expander for Any Language), which e...
Richard C. Wang, William W. Cohen
SIGMOD
2008
ACM
191views Database» more  SIGMOD 2008»
14 years 5 months ago
Efficient aggregation for graph summarization
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
Yuanyuan Tian, Richard A. Hankins, Jignesh M. Pate...