Sciweavers

4166 search results - page 673 / 834
» Automating the constraining process
Sort
View
KDD
2009
ACM
184views Data Mining» more  KDD 2009»
15 years 10 months ago
Thumbs-Up: a game for playing to rank search results
Human computation is an effective way to channel human effort spent playing games to solving computational problems that are easy for humans but difficult for computers to autom...
Ali Dasdan, Chris Drome, Santanu Kolay, Micah Alpe...
137
Voted
CEC
2009
IEEE
15 years 10 months ago
Dispatching rules for production scheduling: A hyper-heuristic landscape analysis
— Hyper-heuristics or “heuristics to chose heuristics” are an emergent search methodology that seeks to automate the process of selecting or combining simpler heuristics in o...
Gabriela Ochoa, José Antonio Vázquez...
131
Voted
CSE
2009
IEEE
15 years 10 months ago
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
Amin Milani Fard, Martin Ester
WCRE
2009
IEEE
15 years 10 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
117
Voted
KBSE
2009
IEEE
15 years 10 months ago
Automatically Recommending Triage Decisions for Pragmatic Reuse Tasks
—Planning a complex software modification task imposes a high cognitive burden on developers, who must juggle navigating the software, understanding what they see with respect t...
Reid Holmes, Tristan Ratchford, Martin P. Robillar...