Sciweavers

2705 search results - page 497 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ML
2000
ACM
244views Machine Learning» more  ML 2000»
15 years 1 months ago
Learnable Evolution Model: Evolutionary Processes Guided by Machine Learning
A new class of evolutionary computation processes is presented, called Learnable Evolution Model or LEM. In contrast to Darwinian-type evolution that relies on mutation, recombinat...
Ryszard S. Michalski
154
Voted
ICSM
2008
IEEE
15 years 8 months ago
Automated severity assessment of software defect reports
In mission critical systems, such as those developed by NASA, it is very important that the test engineers properly recognize the severity of each issue they identify during testi...
Tim Menzies, Andrian Marcus
ECML
2005
Springer
15 years 7 months ago
A Distance-Based Approach for Action Recommendation
Abstract. Rule induction has attracted a great deal of attention in Machine Learning and Data Mining. However, generating rules is not an end in itself because their applicability ...
Ronan Trepos, Ansaf Salleb, Marie-Odile Cordier, V...
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
15 years 7 months ago
Storage Model for CDA Documents
The Health Level 7 Clinic Document Architecture (CDA) is an XML-based document markup standard that specifies the hierarchical structure and semantics of “clinical documents” ...
Zheng Liang, Peter Bodorik, Michael Shepher
DMKD
2003
ACM
114views Data Mining» more  DMKD 2003»
15 years 7 months ago
Deriving link-context from HTML tag tree
HTML anchors are often surrounded by text that seems to describe the destination page appropriately. The text surrounding a link or the link-context is used for a variety of tasks...
Gautam Pant