Sciweavers

7163 search results - page 1277 / 1433
» Privacy-Preserving Data Mining
Sort
View
SIGSOFT
2005
ACM
15 years 4 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
BIRTHDAY
2004
Springer
15 years 4 months ago
Psychologische Theorien sind Information-Retrieval-Verfahren
Psychological models of learning, forgetting, and memory processes are presented. These models describe human information processing as the formation and retrieval of associations...
Manfred Wettler
ROCAI
2004
Springer
15 years 3 months ago
Learning Mixtures of Localized Rules by Maximizing the Area Under the ROC Curve
We introduce a model class for statistical learning which is based on mixtures of propositional rules. In our mixture model, the weight of a rule is not uniform over the entire ins...
Tobias Sing, Niko Beerenwinkel, Thomas Lengauer
VLDB
2004
ACM
163views Database» more  VLDB 2004»
15 years 3 months ago
Compressing Large Boolean Matrices using Reordering Techniques
Large boolean matrices are a basic representational unit in a variety of applications, with some notable examples being interactive visualization systems, mining large graph struc...
David S. Johnson, Shankar Krishnan, Jatin Chhugani...
ICDM
2003
IEEE
95views Data Mining» more  ICDM 2003»
15 years 3 months ago
Evolutionary Gabor Filter Optimization with Application to Vehicle Detection
Abstract—Despite the considerable amount of research work on the application of Gabor filters in pattern classification, their design and selection have been mostly done on a t...
Zehang Sun, George Bebis, Ronald Miller
« Prev « First page 1277 / 1433 Last » Next »