Sciweavers

885 search results - page 57 / 177
» Extensions of the Informative Vector Machine
Sort
View
SIGIR
2008
ACM
15 years 1 months ago
Semi-supervised spam filtering: does it work?
The results of the 2006 ECML/PKDD Discovery Challenge suggest that semi-supervised learning methods work well for spam filtering when the source of available labeled examples diff...
Mona Mojdeh, Gordon V. Cormack
PLDI
2000
ACM
15 years 6 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
DSVIS
2003
Springer
15 years 7 months ago
Applying Extended Finite State Machines in Software Testing of Interactive Systems
Model Based Testing (MBT) is a functional testing technique that makes use of information from behavioral models of the software to carry out the testing task. This technique has b...
Marcelo Fantinato, Mario Jino
CIDR
2003
150views Algorithms» more  CIDR 2003»
15 years 3 months ago
The Database Machine: Old Story, New Slant?
Current database management system technology is not well equipped to provide adequate support for what has been deemed the 3rd wave of computing -- Ubiquitous Computing. Such app...
Julie A. McCann
CORR
2006
Springer
143views Education» more  CORR 2006»
15 years 2 months ago
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can repre...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, G...