Sciweavers

1690 search results - page 140 / 338
» Applications of Metric Coinduction
Sort
View
ICDE
2007
IEEE
96views Database» more  ICDE 2007»
15 years 3 months ago
Mining Software Data
Data mining techniques and machine learning methods are commonly used in several disciplines. It is possible that they could also provide a basis for quality assessment of softwar...
Burak Turhan, F. Onur Kutlubay
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
15 years 3 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
ICPR
2010
IEEE
15 years 2 months ago
Entropy Estimation and Multi-Dimensional Scale Saliency
In this paper we survey two multi-dimensional Scale Saliency approaches based on graphs and the k-d partition algorithm. In the latter case we introduce a new divergence metric an...
Pablo Suau, Francisco Escolano
AIMS
2007
Springer
15 years 1 months ago
Iterative Key Based Routing for Web Services Addressing and Discovery
As the nodes and the resources in a structured peer-to-peer network are indexed with unique identifiers, and as the identifiers are assigned to nodes whose nodeId (i.e., the iden...
Marco Milanesio, Giancarlo Ruffo
NAACL
2003
15 years 1 months ago
Automatic Evaluation of Summaries Using N-gram Co-occurrence Statistics
Following the recent adoption by the machine translation community of automatic evaluation using the BLEU/NIST scoring process, we conduct an in-depth study of a similar idea for ...
Chin-Yew Lin, Eduard H. Hovy