Sciweavers

7163 search results - page 1250 / 1433
» Privacy-Preserving Data Mining
Sort
View
WCRE
2007
IEEE
15 years 5 months ago
Quality Assessment Based on Attribute Series of Software Evolution
Defect density and defect prediction are essential for efficient resource allocation in software evolution. In an empirical study we applied data mining techniques for value seri...
Jacek Ratzinger, Harald Gall, Martin Pinzger
CCS
2007
ACM
15 years 5 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
ECML
2007
Springer
15 years 5 months ago
Scale-Space Based Weak Regressors for Boosting
Boosting is a simple yet powerful modeling technique that is used in many machine learning and data mining related applications. In this paper, we propose a novel scale-space based...
Jin Hyeong Park, Chandan K. Reddy
EEMMAS
2007
Springer
15 years 5 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
76
Voted
PKDD
2007
Springer
91views Data Mining» more  PKDD 2007»
15 years 5 months ago
Domain Adaptation of Conditional Probability Models Via Feature Subsetting
The goal in domain adaptation is to train a model using labeled data sampled from a domain different from the target domain on which the model will be deployed. We exploit unlabel...
Sandeepkumar Satpal, Sunita Sarawagi
« Prev « First page 1250 / 1433 Last » Next »