Sciweavers

834 search results - page 137 / 167
» Analyzing Harmonic Monitoring Data Using Data Mining
Sort
View
101
Voted
CIKM
2008
Springer
14 years 11 months ago
Probabilistic polyadic factorization and its application to personalized recommendation
Multiple-dimensional, i.e., polyadic, data exist in many applications, such as personalized recommendation and multipledimensional data summarization. Analyzing all the dimensions...
Yun Chi, Shenghuo Zhu, Yihong Gong, Yi Zhang
ICSE
2004
IEEE-ACM
15 years 9 months ago
An Empirical Study of Software Reuse vs. Defect-Density and Stability
The paper describes results of an empirical study, where some hypotheses about the impact of reuse on defect-density and stability, and about the impact of component size on defec...
Parastoo Mohagheghi, Reidar Conradi, Ole M. Killi,...
DASC
2006
IEEE
15 years 3 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
SDM
2004
SIAM
165views Data Mining» more  SDM 2004»
14 years 11 months ago
Visualizing RFM Segmentation
Segmentation based on RFM (Recency, Frequency, and Monetary) has been used for over 50 years by direct marketers to target a subset of their customers, save mailing costs, and imp...
Ron Kohavi, Rajesh Parekh
71
Voted
DSN
2006
IEEE
15 years 3 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha