Sciweavers

1700 search results - page 289 / 340
» Evaluating user experiences in games
Sort
View
ICSE
2004
IEEE-ACM
15 years 9 months ago
Finding Latent Code Errors via Machine Learning over Program Executions
This paper proposes a technique for identifying program properties that indicate errors. The technique generates machine learning models of program properties known to result from...
Yuriy Brun, Michael D. Ernst
PERCOM
2005
ACM
15 years 9 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
MOBISYS
2005
ACM
15 years 9 months ago
The Horus WLAN location determination system
We present the design and implementation of the Horus WLAN location determination system. The design of the Horus system aims at satisfying two goals: high accuracy and low comput...
Moustafa Youssef, Ashok K. Agrawala
CVPR
2010
IEEE
15 years 7 months ago
Online Visual Vocabulary Pruning Using Pairwise Constraints
Given a pair of images represented using bag-of-visual words and a label corresponding to whether the images are “related”(must-link constraint) or “unrelated” (must not li...
Pavan Mallapragada, Rong Jin and Anil Jain
DASFAA
2009
IEEE
93views Database» more  DASFAA 2009»
15 years 4 months ago
Top-K Correlation Sub-graph Search in Graph Databases
Recently, due to its wide applications, (similar) subgraph search has attracted a lot of attentions from database and data mining community, such as [13, 18, 19, 5]. In [8], Ke et ...
Lei Zou, Lei Chen 0002, Yansheng Lu