Sciweavers

2932 search results - page 395 / 587
» Higher order mining
Sort
View
109
Voted
SIGKDD
2010
128views more  SIGKDD 2010»
14 years 7 months ago
On cross-validation and stacking: building seemingly predictive models on random data
A number of times when using cross-validation (CV) while trying to do classification/probability estimation we have observed surprisingly low AUC's on real data with very few...
Claudia Perlich, Grzegorz Swirszcz
CCGRID
2009
IEEE
15 years 7 months ago
Markov Model Based Disk Power Management for Data Intensive Workloads
—In order to meet the increasing demands of present and upcoming data-intensive computer applications, there has been a major shift in the disk subsystem, which now consists of m...
Rajat Garg, Seung Woo Son, Mahmut T. Kandemir, Pad...
114
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan
96
Voted
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
15 years 6 months ago
Learning Effectiveness in Web-Based Technology-Mediated Virtual Learning Environment
A framework that delineates the relationships between learner control and learning effectiveness is absent. This study aims to fill this void. Unlike previous research, this study...
Shih-Wei Chou, Chien-Hung Liu
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
15 years 6 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold