Sciweavers

3316 search results - page 457 / 664
» Mining Software Engineering Data
Sort
View
PAMI
2012
13 years 4 months ago
Domain Transfer Multiple Kernel Learning
—Cross-domain learning methods have shown promising results by leveraging labeled patterns from the auxiliary domain to learn a robust classifier for the target domain which has ...
Lixin Duan, Ivor W. Tsang, Dong Xu
206
Voted
POPL
2007
ACM
16 years 2 months ago
Extracting queries by static analysis of transparent persistence
Transparent persistence promises to integrate programming languages and databases by allowing procedural programs to access persistent data with the same ease as non-persistent da...
Ben Wiedermann, William R. Cook
84
Voted
GECCO
2009
Springer
110views Optimization» more  GECCO 2009»
15 years 6 months ago
EMO shines a light on the holes of complexity space
Typical domains used in machine learning analyses only partially cover the complexity space, remaining a large proportion of problem difficulties that are not tested. Since the ac...
Núria Macià, Albert Orriols-Puig, Es...
IJNSEC
2007
194views more  IJNSEC 2007»
15 years 1 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
123
Voted
SIGSOFT
2005
ACM
16 years 2 months ago
Matching execution histories of program versions
We develop a method for matching dynamic histories of program executions of two program versions. The matches produced can be useful in many applications including software piracy...
Xiangyu Zhang, Rajiv Gupta