Sciweavers

6431 search results - page 1277 / 1287
» Model Building by Resolution
Sort
View
WCRE
2010
IEEE
14 years 8 months ago
Predicting Re-opened Bugs: A Case Study on the Eclipse Project
—Bug fixing accounts for a large amount of the software maintenance resources. Generally, bugs are reported, fixed, verified and closed. However, in some cases bugs have to be...
Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid ...
93
Voted
ACL
2010
14 years 7 months ago
Tools for Multilingual Grammar-Based Translation on the Web
This is a system demo for a set of tools for translating texts between multiple languages in real time with high quality. The translation works on restricted languages, and is bas...
Aarne Ranta, Krasimir Angelov, Thomas Hallgren
GIS
2010
ACM
14 years 7 months ago
Tolerance geometry: Euclid's first postulate for points and lines with extension
Object representation and reasoning in vector based geographic information systems (GIS) is based on Euclidean geometry. Euclidean geometry is built upon Euclid's first postu...
Gwen Wilke, Andrew U. Frank
ICDM
2010
IEEE
146views Data Mining» more  ICDM 2010»
14 years 7 months ago
One-Class Matrix Completion with Low-Density Factorizations
Consider a typical recommendation problem. A company has historical records of products sold to a large customer base. These records may be compactly represented as a sparse custom...
Vikas Sindhwani, Serhat Selcuk Bucak, Jianying Hu,...
ISW
2010
Springer
14 years 7 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
« Prev « First page 1277 / 1287 Last » Next »