Sciweavers

488 search results - page 95 / 98
» A Machine Learning Approach to Conjoint Analysis
Sort
View
WCRE
2010
IEEE
14 years 8 months ago
Software Process Recovery: Recovering Process from Artifacts
—Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons in...
Abram Hindle
WWW
2009
ACM
15 years 10 months ago
Purely URL-based topic classification
Given only the URL of a web page, can we identify its topic? This is the question that we examine in this paper. Usually, web pages are classified using their content [7], but a U...
Eda Baykan, Monika Rauch Henzinger, Ludmila Marian...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
15 years 10 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
TSMC
2008
116views more  TSMC 2008»
14 years 9 months ago
Fuzzy Techniques for Subjective Workload-Score Modeling Under Uncertainties
This paper deals with the development of a computer model to estimate the subjective workload score of individuals by evaluating their heart-rate (HR) signals. The identification o...
Mohit Kumar, D. Arndt, Steffi Kreuzfeld, Kerstin T...
PRL
2010
159views more  PRL 2010»
14 years 8 months ago
Creating diverse nearest-neighbour ensembles using simultaneous metaheuristic feature selection
The nearest-neighbour (1NN) classifier has long been used in pattern recognition, exploratory data analysis, and data mining problems. A vital consideration in obtaining good res...
Muhammad Atif Tahir, Jim E. Smith