Sciweavers

5843 search results - page 1022 / 1169
» Software Security in Practice
Sort
View
149
Voted
WWW
2005
ACM
16 years 5 months ago
OWL DL vs. OWL flight: conceptual modeling and reasoning for the semantic Web
The Semantic Web languages RDFS and OWL have been around for some time now. However, the presence of these languages has not brought the breakthrough of the Semantic Web the creat...
Axel Polleres, Dieter Fensel, Jos de Bruijn, Rub&e...
CC
2009
Springer
141views System Software» more  CC 2009»
16 years 5 months ago
Compile-Time Analysis and Specialization of Clocks in Concurrent Programs
Abstract. Clocks are a mechanism for providing synchronization barriers in concurrent programming languages. They are usually implemented using primitive communication mechanisms a...
Nalini Vasudevan, Olivier Tardieu, Julian Dolby, S...
KDD
2007
ACM
335views Data Mining» more  KDD 2007»
16 years 4 months ago
Detecting changes in large data sets of payment card data: a case study
An important problem in data mining is detecting changes in large data sets. Although there are a variety of change detection algorithms that have been developed, in practice it c...
Chris Curry, Robert L. Grossman, David Locke, Stev...
KDD
2005
ACM
130views Data Mining» more  KDD 2005»
16 years 4 months ago
Regression error characteristic surfaces
This paper presents a generalization of Regression Error Characteristic (REC) curves. REC curves describe the cumulative distribution function of the prediction error of models an...
Luís Torgo
139
Voted
KDD
2004
ACM
190views Data Mining» more  KDD 2004»
16 years 4 months ago
V-Miner: using enhanced parallel coordinates to mine product design and test data
Analyzing data to find trends, correlations, and stable patterns is an important task in many industrial applications. This paper proposes a new technique based on parallel coordi...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
« Prev « First page 1022 / 1169 Last » Next »