Sciweavers

26354 search results - page 5151 / 5271
» How we refactor, and how we know it
Sort
View
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
15 years 1 days ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
129
Voted
MBEES
2010
15 years 1 days ago
Test Case Integration: From Components to Systems
In a component-based development approach system integration generally implies the packaging and deployment of a group of software components on hardware units, possibly hiding th...
Bernhard Schätz, Christian Pfaller
MDM
2010
Springer
188views Communications» more  MDM 2010»
15 years 1 days ago
A Distributed Technique for Dynamic Operator Placement in Wireless Sensor Networks
—We present an optimal distributed algorithm to adapt the placement of a single operator in high communication cost networks, such as a wireless sensor network. Our parameterfree...
Georgios Chatzimilioudis, Nikos Mamoulis, Dimitrio...
112
Voted
MICCAI
2010
Springer
15 years 1 days ago
Multi-Class Sparse Bayesian Regression for Neuroimaging Data Analysis
The use of machine learning tools is gaining popularity in neuroimaging, as it provides a sensitive assessment of the information conveyed by brain images. In particular, finding ...
Vincent Michel, Evelyn Eger, Christine Keribin, Be...
PRL
2010
159views more  PRL 2010»
15 years 1 days ago
Creating diverse nearest-neighbour ensembles using simultaneous metaheuristic feature selection
The nearest-neighbour (1NN) classifier has long been used in pattern recognition, exploratory data analysis, and data mining problems. A vital consideration in obtaining good res...
Muhammad Atif Tahir, Jim E. Smith
« Prev « First page 5151 / 5271 Last » Next »