Sciweavers

3316 search results - page 261 / 664
» Mining Software Engineering Data
Sort
View
142
Voted
DAS
2006
Springer
15 years 5 months ago
XCDF: A Canonical and Structured Document Format
Accessing the structured content of PDF document is a difficult task, requiring pre-processing and reverse engineering techniques. In this paper, we first present different methods...
Jean-Luc Bloechle, Maurizio Rigamonti, Karim Hadja...
119
Voted
ISORC
2005
IEEE
15 years 9 months ago
An Automated Distributed Infrastructure for Collecting Bluetooth Field Failure Data
The widespread use of mobile and wireless computing platforms is leading to a growing interest on dependability issues. Several research studies have been conducted on dependabili...
Marcello Cinque, Fabio Cornevilli, Domenico Cotron...
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
16 years 4 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
EDBT
2010
ACM
170views Database» more  EDBT 2010»
15 years 6 months ago
Augmenting OLAP exploration with dynamic advanced analytics
Online Analytical Processing (OLAP) is a popular technique for explorative data analysis. Usually, a fixed set of dimensions (such as time, place, etc.) is used to explore and ana...
Benjamin Leonhardi, Bernhard Mitschang, Rubé...
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
15 years 9 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...