Sciweavers

13841 search results - page 2382 / 2769
» Algorithms and Constraint Programming
Sort
View
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
16 years 5 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
CHI
2008
ACM
16 years 5 months ago
Investigating statistical machine learning as a tool for software development
As statistical machine learning algorithms and techniques continue to mature, many researchers and developers see statistical machine learning not only as a topic of expert study,...
Kayur Patel, James Fogarty, James A. Landay, Bever...
ICALP
2009
Springer
16 years 5 months ago
Learning Halfspaces with Malicious Noise
We give new algorithms for learning halfspaces in the challenging malicious noise model, where an adversary may corrupt both the labels and the underlying distribution of examples....
Adam R. Klivans, Philip M. Long, Rocco A. Servedio
MOBIHOC
2003
ACM
16 years 4 months ago
Energy-efficient caching strategies in ad hoc wireless networks
In this paper, we address the problem of energy-conscious cache placement in wireless ad hoc networks. We consider a network comprising a server with an interface to the wired net...
Pavan Nuggehalli, Vikram Srinivasan, Carla-Fabiana...
122
Voted
FOCS
2009
IEEE
15 years 11 months ago
On Allocating Goods to Maximize Fairness
Given a set A of m agents and a set I of n items, where agent A ∈ A has utility uA,i for item i ∈ I, our goal is to allocate items to agents to maximize fairness. Specificall...
Deeparnab Chakrabarty, Julia Chuzhoy, Sanjeev Khan...
« Prev « First page 2382 / 2769 Last » Next »