Sciweavers

83
Voted
SAC
2015
ACM
9 years 11 months ago
Evaluating defect prediction approaches using a massive set of metrics: an empirical study
To evaluate the performance of a within-project defect prediction approach, people normally use precision, recall, and F-measure scores. However, in machine learning literature, t...
Xiao Xuan, David Lo, Xin Xia, Yuan Tian
83
Voted
SAC
2015
ACM
9 years 11 months ago
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs
Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed ...
Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-...
82
Voted
SAC
2015
ACM
9 years 11 months ago
Alternating model trees
Model tree induction is a popular method for tackling regression problems requiring interpretable models. Model trees are decision trees with multiple linear regression models at ...
Eibe Frank, Michael Mayo, Stefan Kramer 0001
94
Voted
SAC
2015
ACM
9 years 11 months ago
Key correlation mining by simultaneous monotone and anti-monotone constraints checking
Correlated pattern mining has become increasingly an important task in data mining and knowledge discovery. In practice, the exploitation of correlated patterns is hampered by the...
Souad Bouasker, Sadok Ben Yahia
83
Voted
SAC
2015
ACM
9 years 11 months ago
Deep learning in partially-labeled data streams
Of the considerable research on data streams, relatively little deals with classification where only some of the instances in the stream are labeled. Most state-of-the-art data-s...
Jesse Read, Fernando Pérez-Cruz, Albert Bif...