Sciweavers

2006 search results - page 105 / 402
» Heuristic Security-Testing Methods
Sort
View
JMLR
2006
145views more  JMLR 2006»
15 years 2 months ago
Ensemble Pruning Via Semi-definite Programming
An ensemble is a group of learning models that jointly solve a problem. However, the ensembles generated by existing techniques are sometimes unnecessarily large, which can lead t...
Yi Zhang 0006, Samuel Burer, W. Nick Street
WABI
2009
Springer
127views Bioinformatics» more  WABI 2009»
15 years 9 months ago
Constructing Majority-Rule Supertrees
Background: Supertree methods combine the phylogenetic information from multiple partially-overlapping trees into a larger phylogenetic tree called a supertree. Several supertree ...
Jianrong Dong, David Fernández-Baca, Fred R...
CHI
2004
ACM
16 years 2 months ago
Modeling analyst performance for usability inspection
This research takes an analyst-centred approach to improving Usability Inspection Methods. The research approach adopts novel instruments and methods, especially manipulation and ...
Alan Woolrych
DATE
2008
IEEE
66views Hardware» more  DATE 2008»
15 years 9 months ago
Wrapper and TAM Co-Optimization for Reuse of SoC Functional Interconnects
This paper presents a wrapper and TAM co-optimization method for reuse of SoC functional interconnects to minimize test time under area constraint. The proposed method consists of...
Tomokazu Yoneda, Hideo Fujiwara
103
Voted
IDA
1999
Springer
15 years 6 months ago
Discovering Dynamics Using Bayesian Clustering
Abstract. This paper introduces a Bayesian method for clustering dynamic processes and applies it to the characterization of the dynamics of a military scenario. The method models ...
Paola Sebastiani, Marco Ramoni, Paul R. Cohen, Joh...