Sciweavers

3212 search results - page 405 / 643
» Faster Concept Analysis
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
ICSE
2001
IEEE-ACM
15 years 9 months ago
Using Transformation Systems for Software Maintenance and Reengineering
Software maintenance costs dominate software engineering costs, partly because most such engineering is done manually. Program Transformation tools leverage an engineer-provided b...
Ira D. Baxter
PKDD
1998
Springer
273views Data Mining» more  PKDD 1998»
15 years 8 months ago
TextVis: An Integrated Visual Environment for Text Mining
TextVis is a visual data mining system for document collections. Such a collection represents an application domain, and the primary goal of the system is to derive patterns that p...
David Landau, Ronen Feldman, Yonatan Aumann, Moshe...
137
Voted
ICCS
1997
Springer
15 years 8 months ago
Uncovering the Conceptual Models in Ripple Down Rules
: The need for analysis and modeling of knowledge has been espoused by many researchers as a prerequisite to building knowledge based systems (KBS). This approach has done little t...
Debbie Richards, Paul Compton
CIVR
2008
Springer
222views Image Analysis» more  CIVR 2008»
15 years 6 months ago
Automatic image annotation via local multi-label classification
As the consequence of semantic gap, visual similarity does not guarantee semantic similarity, which in general is conflicting with the inherent assumption of many generativebased ...
Mei Wang, Xiangdong Zhou, Tat-Seng Chua