Sciweavers

3316 search results - page 340 / 664
» Mining Software Engineering Data
Sort
View
129
Voted
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
16 years 3 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
131
Voted
DMIN
2009
132views Data Mining» more  DMIN 2009»
15 years 1 months ago
Understanding Support Vector Machine Classifications via a Recommender System-Like Approach
Support vector machines are a valuable tool for making classifications, but their black-box nature means that they lack the natural explanatory value that many other classifiers po...
David Barbella, Sami Benzaid, Janara M. Christense...
145
Voted
EDM
2009
124views Data Mining» more  EDM 2009»
15 years 1 months ago
Detecting and Understanding the Impact of Cognitive and Interpersonal Conflict in Computer Supported Collaborative Learning Envi
This paper presents a model which can automatically detect a variety of student speech acts as students collaborate within a computer supported collaborative learning environment. ...
David Prata, Ryan Baker, Evandro Costa, Carolyn Pe...
C3S2E
2008
ACM
15 years 5 months ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
167
Voted
CASES
2010
ACM
15 years 1 months ago
Mighty-morphing power-SIMD
In modern wireless devices, two broad classes of compute-intensive applications are common: those with high amounts of data-level parallelism, such as signal processing used in wi...
Ganesh S. Dasika, Mark Woh, Sangwon Seo, Nathan Cl...