Sciweavers

431 search results - page 57 / 87
» The five orders of ignorance
Sort
View
ICSE
1999
IEEE-ACM
15 years 4 months ago
Pattern-Based Reverse-Engineering of Design Components
Many reverse-engineering tools have been developed to detract representations from source code. Yet, most of these tools completely ignore recovery of the all-important rationale ...
Rudolf K. Keller, Reinhard Schauer, Sébasti...
ICCCN
1998
IEEE
15 years 4 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer
KDD
1998
ACM
106views Data Mining» more  KDD 1998»
15 years 4 months ago
Simultaneous Reliability Evaluation of Generality and Accuracy for Rule Discovery in Databases
This paper presents an algorithm for discovering conjunction rules with high reliability from data sets. The discovery of conjunction rules, each of which is a restricted form of ...
Einoshin Suzuki
KDD
2010
ACM
435views Data Mining» more  KDD 2010»
15 years 3 months ago
Topic models with power-law using Pitman-Yor process
One of the important approaches for Knowledge discovery and Data mining is to estimate unobserved variables because latent variables can indicate hidden and specific properties o...
Issei Sato, Hiroshi Nakagawa
GLVLSI
2009
IEEE
172views VLSI» more  GLVLSI 2009»
15 years 3 months ago
Contact merging algorithm for efficient substrate noise analysis in large scale circuits
A methodology is proposed to efficiently estimate the substrate noise generated by large scale aggressor circuits. Small spatial voltage differences within the ground distribution...
Emre Salman, Renatas Jakushokas, Eby G. Friedman, ...