Sciweavers

1199 search results - page 217 / 240
» How to Compare the Power of Computational Models
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 3 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
CVPR
2000
IEEE
16 years 1 months ago
Statistical cues for Domain Specific Image Segmentation with Performance Analysis
This paper investigates the use of colour and texture cues for segmentation of images within two specified domains. The first is the Sowerby dataset, which contains one hundred co...
Scott Konishi, Alan L. Yuille
DIS
2007
Springer
15 years 6 months ago
A Hilbert Space Embedding for Distributions
We describe a technique for comparing distributions without the need for density estimation as an intermediate step. Our approach relies on mapping the distributions into a reprodu...
Alexander J. Smola, Arthur Gretton, Le Song, Bernh...
RE
2008
Springer
14 years 11 months ago
Design Science, Engineering Science and Requirements Engineering
For several decades there has been a debate in the computing sciences about the relative roles of design and empirical research, and about the contribution of design and research ...
Roel Wieringa, J. M. G. Heerkens
INFOVIS
2003
IEEE
15 years 5 months ago
Visualizing Evolving Networks: Minimum Spanning Trees versus Pathfinder Networks
Network evolution is a ubiquitous phenomenon in a wide variety of complex systems. There is an increasing interest in statistically modeling the evolution of complex networks such...
Chaomei Chen, Steven Morris