Sciweavers

277 search results - page 34 / 56
» Using minimum description length for process mining
Sort
View
MSR
2010
ACM
15 years 3 months ago
Predicting the severity of a reported bug
—The severity of a reported bug is a critical factor in deciding how soon it needs to be fixed. Unfortunately, while clear guidelines exist on how to assign the severity of a bu...
Ahmed Lamkanfi, Serge Demeyer, Emanuel Giger, Bart...
WACV
2005
IEEE
15 years 3 months ago
Ensemble Methods in the Clustering of String Patterns
We address the problem of clustering of contour images from hardware tools based on string descriptions, in a comparative study of cluster combination techniques. Several clusteri...
André Lourenço, Ana L. N. Fred
CVPR
2006
IEEE
16 years 4 days ago
AnnoSearch: Image Auto-Annotation by Search
Although it has been studied for several years by computer vision and machine learning communities, image annotation is still far from practical. In this paper, we present AnnoSea...
Xin-Jing Wang, Lei Zhang, Feng Jing, Wei-Ying Ma
EUROGP
2001
Springer
103views Optimization» more  EUROGP 2001»
15 years 2 months ago
Computational Complexity, Genetic Programming, and Implications
Recent theory work has shown that a Genetic Program (GP) used to produce programs may have output that is bounded above by the GP itself [l]. This paper presents proofs that show t...
Bart Rylander, Terence Soule, James A. Foster
WSDM
2010
ACM
322views Data Mining» more  WSDM 2010»
15 years 7 months ago
Inferring Search Behaviors Using Partially Observable Markov (POM) Model
This article describes an application of the partially observable Markov (POM) model to the analysis of a large scale commercial web search log. Mathematically, POM is a variant o...
Kuansan Wang, Nikolas Gloy, Xiaolong Li