Sciweavers

2841 search results - page 116 / 569
» A Call to Order
Sort
View
CIDM
2007
IEEE
15 years 4 months ago
Measuring the Validity of Document Relations Discovered from Frequent Itemset Mining
— The extension approach of frequent itemset mining can be applied to discover the relations among documents. Several schemes, i.e., n-gram, stemming, stopword removal and term w...
Kritsada Sriphaew, Thanaruk Theeramunkong
ECBS
2007
IEEE
119views Hardware» more  ECBS 2007»
15 years 4 months ago
IPOG: A General Strategy for T-Way Software Testing
Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can ...
Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun,...
APSCC
2009
IEEE
15 years 3 months ago
Model driven approach to Service oriented Enterprise Architecture
Enterprise Architecture (EA) has become an important means to acquire and maintain knowledge about the structure and behavior of the enterprises and to develop the required IT sys...
Sedigheh Khoshnevis, Fereidoon Shams Aliee, Pooyan...
PAMI
2012
13 years 13 days ago
Simultaneously Fitting and Segmenting Multiple-Structure Data with Outliers
Abstract—We propose a robust fitting framework, called Adaptive Kernel-Scale Weighted Hypotheses (AKSWH), to segment multiplestructure data even in the presence of a large number...
Hanzi Wang, Tat-Jun Chin, David Suter
JCP
2007
105views more  JCP 2007»
14 years 10 months ago
Intuitive Network Applications: Learning for Personalized Converged Services Involving Social Networks
Abstract— The convergence of the wireline telecom, wireless telecom, and internet networks and the services they provide offers tremendous opportunities in services personalizati...
Robert Dinoff, Tin Kam Ho, Richard Hull, Bharat Ku...