Sciweavers

3651 search results - page 583 / 731
» Data Mining for Security Applications
Sort
View
122
Voted
WWW
2009
ACM
16 years 1 months ago
Mapping the world's photos
We investigate how to organize a large collection of geotagged photos, working with a dataset of about 35 million images collected from Flickr. Our approach combines content analy...
David J. Crandall, Lars Backstrom, Daniel P. Hutte...
86
Voted
ICSE
2004
IEEE-ACM
16 years 1 months ago
An Empirical Study of Software Reuse vs. Defect-Density and Stability
The paper describes results of an empirical study, where some hypotheses about the impact of reuse on defect-density and stability, and about the impact of component size on defec...
Parastoo Mohagheghi, Reidar Conradi, Ole M. Killi,...
105
Voted
ECML
2007
Springer
15 years 7 months ago
Scale-Space Based Weak Regressors for Boosting
Boosting is a simple yet powerful modeling technique that is used in many machine learning and data mining related applications. In this paper, we propose a novel scale-space based...
Jin Hyeong Park, Chandan K. Reddy
149
Voted
ITICSE
2004
ACM
15 years 6 months ago
Use of large databases for group projects at the nexus of teaching and research
Final year, group (capstone) projects in computing disciplines are often expected to fill multiple roles: in addition to allowing students to learn important domain-specific knowl...
Richard C. Thomas, Rebecca Mancy
133
Voted
CIKM
2001
Springer
15 years 5 months ago
Selecting Relevant Instances for Efficient and Accurate Collaborative Filtering
Collaborative filtering uses a database about consumers’ preferences to make personal product recommendations and is achieving widespread success in both E-Commerce and Informat...
Kai Yu, Xiaowei Xu, Martin Ester, Hans-Peter Krieg...