Sciweavers

3443 search results - page 232 / 689
» More Algebras for Determiners
Sort
View
105
Voted
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
16 years 1 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor
89
Voted
ICST
2009
IEEE
15 years 7 months ago
The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction
Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software...
Fadi Wedyan, Dalal Alrmuny, James M. Bieman
85
Voted
CIDM
2007
IEEE
15 years 7 months ago
Measuring the Validity of Document Relations Discovered from Frequent Itemset Mining
— The extension approach of frequent itemset mining can be applied to discover the relations among documents. Several schemes, i.e., n-gram, stemming, stopword removal and term w...
Kritsada Sriphaew, Thanaruk Theeramunkong
HAPTICS
2007
IEEE
15 years 7 months ago
A Behavioral Adaptation Approach to Identifying Visual Dependence of Haptic Perception
Both haptic and visual senses play a role in how we explore our environment. Previous studies have shown that vision plays a very strong role in perception of object stiffness, ye...
James S. Sulzer, Arsalan Salamat, Vikram S. Chib, ...
IEEEPACT
2006
IEEE
15 years 6 months ago
A two-phase escape analysis for parallel java programs
Thread escape analysis conservatively determines which objects may be accessed in more than one thread. Thread escape analysis is useful for a variety of purposes – finding rac...
Kyungwoo Lee, Samuel P. Midkiff