Sciweavers

10038 search results - page 1902 / 2008
» Model Checking for Managers
Sort
View
105
Voted
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 1 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
104
Voted
KDD
2004
ACM
154views Data Mining» more  KDD 2004»
16 years 1 months ago
Diagnosing extrapolation: tree-based density estimation
There has historically been very little concern with extrapolation in Machine Learning, yet extrapolation can be critical to diagnose. Predictor functions are almost always learne...
Giles Hooker
111
Voted
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 1 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
145
Voted
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
16 years 1 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
115
Voted
HPCA
2008
IEEE
16 years 1 months ago
Amdahl's Law in the multicore era
We apply Amdahl's Law to multicore chips using symmetric cores, asymmetric cores, and dynamic techniques that allows cores to work together on sequential execution. To Amdahl...
Mark D. Hill
« Prev « First page 1902 / 2008 Last » Next »