Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
—This paper addresses two main challenges for clustering which require extensive human effort: selecting appropriate parameters for an arbitrary clustering algorithm and identify...
Rachsuda Jiamthapthaksin, Christoph F. Eick, Vadee...
—The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy wou...
Abstract. This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy ...
Many end user programming tools such as spreadsheets and databases offer poor support for representing a level of abstraction that is intuitive to users. For example, users must w...