Sciweavers

2932 search results - page 395 / 587
» Higher order mining
Sort
View
SIGKDD
2010
128views more  SIGKDD 2010»
15 years 6 days ago
On cross-validation and stacking: building seemingly predictive models on random data
A number of times when using cross-validation (CV) while trying to do classification/probability estimation we have observed surprisingly low AUC's on real data with very few...
Claudia Perlich, Grzegorz Swirszcz
CCGRID
2009
IEEE
16 years 7 days ago
Markov Model Based Disk Power Management for Data Intensive Workloads
—In order to meet the increasing demands of present and upcoming data-intensive computer applications, there has been a major shift in the disk subsystem, which now consists of m...
Rajat Garg, Seung Woo Son, Mahmut T. Kandemir, Pad...
GLOBECOM
2008
IEEE
15 years 12 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
15 years 11 months ago
Learning Effectiveness in Web-Based Technology-Mediated Virtual Learning Environment
A framework that delineates the relationships between learner control and learning effectiveness is absent. This study aims to fill this void. Unlike previous research, this study...
Shih-Wei Chou, Chien-Hung Liu
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
15 years 11 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold