Sciweavers

292 search results - page 24 / 59
» Are Stable Instances Easy
Sort
View
110
Voted
CIKM
2010
Springer
14 years 11 months ago
Partial drift detection using a rule induction framework
The major challenge in mining data streams is the issue of concept drift, the tendency of the underlying data generation process to change over time. In this paper, we propose a g...
Damon Sotoudeh, Aijun An
122
Voted
CSMR
2011
IEEE
14 years 4 months ago
Sub-graph Mining: Identifying Micro-architectures in Evolving Object-Oriented Software
Abstract—Developers introduce novel and undocumented micro-architectures when performing evolution tasks on object-oriented applications. We are interested in understanding wheth...
Ahmed Belderrar, Segla Kpodjedo, Yann-Gaël Gu...
122
Voted
MST
2011
200views Hardware» more  MST 2011»
14 years 7 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
100
Voted
DAGSTUHL
2004
15 years 2 months ago
Testing with Functions as Specifications
Although computer systems penetrate all facets of society, the software running those systems may contain many errors. Producing high quality software appears to be difficult and v...
Pieter W. M. Koopman
111
Voted
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 10 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta