Sciweavers

773 search results - page 148 / 155
» Evaluation of the SRA Tool Using Data Mining Techniques
Sort
View
93
Voted
JDWM
2007
122views more  JDWM 2007»
14 years 11 months ago
A Hyper-Heuristic for Descriptive Rule Induction
Rule induction from examples is a machine learning technique that finds rules of the form condition → class, where condition and class are logic expressions of the form variable...
Tho Hoan Pham, Tu Bao Ho
USENIX
2007
15 years 2 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
ICSE
2008
IEEE-ACM
16 years 14 days ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
ICDE
2007
IEEE
170views Database» more  ICDE 2007»
16 years 1 months ago
Tree-Pattern Similarity Estimation for Scalable Content-based Routing
With the advent of XML as the de facto language for data publishing and exchange, scalable distribution of XML data to large, dynamic populations of consumers remains an important...
Raphaël Chand, Pascal Felber, Minos N. Garofa...
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Medical Visual Information Retrieval: State of the Art and Challenges Ahead
Today’s medical institutions produce enormous amounts of data on patients, including multimedia data, which is increasingly produced in digital form. These data in their clinica...
Henning Müller, Xin Zhou, Adrien Depeursinge,...