Sciweavers

7928 search results - page 1460 / 1586
» Human-Like Learning Methods for a
Sort
View
ISESE
2006
IEEE
15 years 11 months ago
Identifying domain-specific defect classes using inspections and change history
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Taiga Nakamura, Lorin Hochstein, Victor R. Basili
ISPASS
2006
IEEE
15 years 11 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
145
Voted
QSIC
2006
IEEE
15 years 11 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
SYNASC
2006
IEEE
95views Algorithms» more  SYNASC 2006»
15 years 11 months ago
Evolutionary Support Vector Regression Machines
Evolutionary support vector machines (ESVMs) are a novel technique that assimilates the learning engine of the state-of-the-art support vector machines (SVMs) but evolves the coef...
Ruxandra Stoean, Dumitru Dumitrescu, Mike Preuss, ...
167
Voted
WISE
2006
Springer
15 years 11 months ago
2D/3D Web Visualization on Mobile Devices
Abstract. Visualization is able to present the rich Web information intuitively and make the Web search/mining more productive. Mobile computing is able to provide the flexibility...
Yi Wang, Li-Zhu Zhou, Jianhua Feng, Lei Xie, Chun ...
« Prev « First page 1460 / 1586 Last » Next »