Sciweavers

1157 search results - page 162 / 232
» A Machine Learning Approach for Statistical Software Testing
Sort
View
ANOR
2011
175views more  ANOR 2011»
14 years 4 months ago
Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection
A vital task facing government agencies and commercial organizations that report data is to represent the data in a meaningful way and simultaneously to protect the confidentialit...
Fred Glover, Lawrence H. Cox, Rahul Patil, James P...
JOIN
2006
113views more  JOIN 2006»
14 years 9 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
TRECVID
2007
14 years 11 months ago
NII-ISM, Japan at TRECVID 2007: High Level Feature Extraction
This paper reports our experiments on the concept detection task of TRECVID 2007. In these experiments, we have addressed two approaches which are selecting and fusing features and...
Duy-Dinh Le, Shin'ichi Satoh, Tomoko Matsui
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
14 years 7 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
MM
2003
ACM
84views Multimedia» more  MM 2003»
15 years 3 months ago
Temporal event clustering for digital photo collections
We present similarity-based methods to cluster digital photos by time and image content. The approach is general, unsupervised, and makes minimal assumptions regarding the structu...
Matthew L. Cooper, Jonathan Foote, Andreas Girgens...