Sciweavers

650 search results - page 69 / 130
» Packaging experiences for improving testing technique select...
Sort
View
FIMI
2004
123views Data Mining» more  FIMI 2004»
14 years 11 months ago
Surprising Results of Trie-based FIM Algorithms
Trie is a popular data structure in frequent itemset mining (FIM) algorithms. It is memory-efficient, and allows fast construction and information retrieval. Many trie-related tec...
Ferenc Bodon
CHI
2005
ACM
15 years 10 months ago
Measuring the effective parameters of steering motions
The steering law model describes pointing device motion through constrained paths. Previous uses of the model are deficient because they are built using only error-free responses,...
I. Scott MacKenzie, Sergey Kulikov, Wolfgang St&uu...
EMSOFT
2009
Springer
15 years 4 months ago
Cache-aware scheduling and analysis for multicores
The major obstacle to use multicores for real-time applications is that we may not predict and provide any guarantee on real-time properties of embedded software on such platforms...
Nan Guan, Martin Stigge, Wang Yi, Ge Yu
ICDM
2007
IEEE
96views Data Mining» more  ICDM 2007»
15 years 4 months ago
The Chosen Few: On Identifying Valuable Patterns
Constrained pattern mining extracts patterns based on their individual merit. Usually this results in far more patterns than a human expert or a machine learning technique could m...
Björn Bringmann, Albrecht Zimmermann
CIDM
2007
IEEE
14 years 10 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...