Sciweavers

2032 search results - page 338 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
MSR
2005
ACM
15 years 3 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
GLOBECOM
2010
IEEE
14 years 7 months ago
PRO: A Profile-Based Routing Protocol for Pocket Switched Networks
In this paper, we propose a novel routing protocol, PRO, for profile-based routing in pocket switched networks. Differing from previous routing protocols, PRO treats node encounter...
Murat Ali Bayir, Murat Demirbas
ICSE
2012
IEEE-ACM
13 years 4 days ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
SDM
2011
SIAM
233views Data Mining» more  SDM 2011»
14 years 17 days ago
Distributed Monitoring of the R2 Statistic for Linear Regression
The problem of monitoring a multivariate linear regression model is relevant in studying the evolving relationship between a set of input variables (features) and one or more depe...
Kanishka Bhaduri, Kamalika Das, Chris Giannella
WSDM
2009
ACM
148views Data Mining» more  WSDM 2009»
15 years 4 months ago
Information arbitrage across multi-lingual Wikipedia
The rapid globalization of Wikipedia is generating a parallel, multi-lingual corpus of unprecedented scale. Pages for the same topic in many different languages emerge both as a r...
Eytan Adar, Michael Skinner, Daniel S. Weld