Sciweavers

2539 search results - page 251 / 508
» Debugging Method Names
Sort
View
PAKDD
2005
ACM
132views Data Mining» more  PAKDD 2005»
15 years 8 months ago
SETRED: Self-training with Editing
Self-training is a semi-supervised learning algorithm in which a learner keeps on labeling unlabeled examples and retraining itself on an enlarged labeled training set. Since the s...
Ming Li, Zhi-Hua Zhou
UM
2005
Springer
15 years 8 months ago
Exploiting Probabilistic Latent Information for the Construction of Community Web Directories
This paper improves a recently-presented approach to Web Personalization, named Community Web Directories, which applies personalization techniques to Web Directories. The Web dire...
Dimitrios Pierrakos, Georgios Paliouras
CHES
2004
Springer
130views Cryptology» more  CHES 2004»
15 years 8 months ago
Switching Blindings with a View Towards IDEA
Cryptographic algorithms implemented on smart-cards must be protected against side-channel attacks. Some encryption schemes and hash functions like IDEA, RC6, MD5, SHA-1 alternate ...
Olaf Neiße, Jürgen Pulkus
CIA
2004
Springer
15 years 8 months ago
A Probabilistic Approach to Predict Peers? Performance in P2P Networks
The problem of encouraging trustworthy behavior in P2P online communities by managing peers’ reputations has drawn a lot of attention recently. However, most of the proposed solu...
Zoran Despotovic, Karl Aberer
91
Voted
GG
2004
Springer
15 years 8 months ago
Translating Java Code to Graph Transformation Systems
We propose a faithful encoding of Java programs (written in a suitable fragment of the language) to Graph Transformation Systems. Every program is translated to a set of rules incl...
Andrea Corradini, Fernando Luís Dotti, Luci...