Sciweavers

288 search results - page 37 / 58
» Managing iterations with UNICASE
Sort
View
102
Voted
ICSE
2008
IEEE-ACM
16 years 2 months ago
Best practices in extreme programming course design
Teaching (and therefore learning) eXtreme Programming (XP) in a university setting is difficult because of course time limitations and the soft nature of XP that requires first-ha...
Kai Stapel, Daniel Lübke, Eric Knauss
KDD
2009
ACM
202views Data Mining» more  KDD 2009»
16 years 2 months ago
Correlated itemset mining in ROC space: a constraint programming approach
Correlated or discriminative pattern mining is concerned with finding the highest scoring patterns w.r.t. a correlation measure (such as information gain). By reinterpreting corre...
Siegfried Nijssen, Tias Guns, Luc De Raedt
109
Voted
KDD
2009
ACM
182views Data Mining» more  KDD 2009»
16 years 2 months ago
Scalable graph clustering using stochastic flows: applications to community discovery
Algorithms based on simulating stochastic flows are a simple and natural solution for the problem of clustering graphs, but their widespread use has been hampered by their lack of...
Venu Satuluri, Srinivasan Parthasarathy
110
Voted
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 2 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
108
Voted
KDD
2003
ACM
160views Data Mining» more  KDD 2003»
16 years 2 months ago
Playing hide-and-seek with correlations
We present a method for very high-dimensional correlation analysis. The method relies equally on rigorous search strategies and on human interaction. At each step, the method cons...
Chris Jermaine