Sciweavers

2553 search results - page 193 / 511
» Modeling Trees with Hypertextures
Sort
View
120
Voted
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 10 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
QSIC
2007
IEEE
15 years 10 months ago
Automatic Quality Assessment of SRS Text by Means of a Decision-Tree-Based Text Classifier
The success of a software project is largely dependent upon the quality of the Software Requirements Specification (SRS) document, which serves as a medium to communicate user req...
Ishrar Hussain, Olga Ormandjieva, Leila Kosseim
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 10 months ago
Missing the Forest for the Trees - Object Technology's Second Hiatus
Object technology was first created in 1967, but it had to wait till the mid 80’s for widespread acceptance and adoption. We observe that that was not the only hiatus for the te...
Viswanathan Kodaganallur
CONSTRAINTS
2008
95views more  CONSTRAINTS 2008»
15 years 4 months ago
Efficient Sequence Alignment with Side-Constraints by Cluster Tree Elimination
Aligning DNA and protein sequences is a core technique in molecular biology. Often, it is desirable to include partial prior knowledge and conditions in an alignment. Going beyond...
Sebastian Will, Anke Busch, Rolf Backofen
ENTCS
2007
104views more  ENTCS 2007»
15 years 3 months ago
Exogenous Probabilistic Computation Tree Logic
We define a logic EpCTL for reasoning about the evolution of probabilistic systems. System states correspond to probability distributions over classical states and the system evo...
Pedro Baltazar, Paulo Mateus, Rajagopal Nagarajan,...