Sciweavers

726 search results - page 48 / 146
» From Anomaly Reports to Cases
Sort
View
KDD
2001
ACM
211views Data Mining» more  KDD 2001»
16 years 6 days ago
Magical thinking in data mining: lessons from CoIL challenge 2000
CoIL challenge 2000 was a supervised learning contest that attracted 43 entries. The authors of 29 entries later wrote explanations of their work. This paper discusses these repor...
Charles Elkan
UML
2005
Springer
15 years 5 months ago
Lessons Learned from Developing a Dynamic OCL Constraint Enforcement Tool for Java
Analysis and design by contract allows the definition of a formal agreement between a class and its clients, expressing each party’s rights and obligations. Contracts written in ...
Wojciech J. Dzidek, Lionel C. Briand, Yvan Labiche
ASWEC
2000
IEEE
15 years 4 months ago
Formal Requirements Engineering: Learning from the Students
Formal methods are becoming increasingly important in many areas of software development and should be incorporated in the teaching of software engineering. Requirements capture i...
J. Paul Gibson
KDD
2006
ACM
142views Data Mining» more  KDD 2006»
16 years 6 days ago
Mining distance-based outliers from large databases in any metric space
Let R be a set of objects. An object o R is an outlier, if there exist less than k objects in R whose distances to o are at most r. The values of k, r, and the distance metric ar...
Yufei Tao, Xiaokui Xiao, Shuigeng Zhou
JASIS
2008
77views more  JASIS 2008»
14 years 11 months ago
Citers' use of citees' names: Findings from a qualitative interview-based study
This article focuses on why academic writers in computer science and sociology sometimes supply the reader with more details of citees' names than they need to: why citers na...
Nigel Harwood