Sciweavers

1296 search results - page 137 / 260
» Multiplicative Background Risk
Sort
View
154
Voted
ICCV
2009
IEEE
14 years 10 months ago
Selection and context for action recognition
Recognizing human action in non-instrumented video is a challenging task not only because of the variability produced by general scene factors like illumination, background, occlu...
Dong Han, Liefeng Bo, Cristian Sminchisescu
100
Voted
SIGSOFT
2008
ACM
16 years 1 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
SIGSOFT
2004
ACM
16 years 1 months ago
Empirical evaluation of defect projection models for widely-deployed production software systems
Defect-occurrence projection is necessary for the development of methods to mitigate the risks of software defect occurrences. In this paper, we examine user-reported software def...
Paul Luo Li, Mary Shaw, James D. Herbsleb, Bonnie ...
129
Voted
KDD
2008
ACM
181views Data Mining» more  KDD 2008»
16 years 1 months ago
Fastanova: an efficient algorithm for genome-wide association study
Studying the association between quantitative phenotype (such as height or weight) and single nucleotide polymorphisms (SNPs) is an important problem in biology. To understand und...
Xiang Zhang, Fei Zou, Wei Wang 0010
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 1 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng