Sciweavers

680 search results - page 74 / 136
» A Comparative Study of Threshold-Based Feature Selection Tec...
Sort
View
PKDD
2010
Springer
127views Data Mining» more  PKDD 2010»
13 years 7 months ago
Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs
Defect localisation is essential in software engineering and is an important task in domain-specific data mining. Existing techniques building on call-graph mining can localise dif...
Frank Eichinger, Klaus Krogmann, Roland Klug, Klem...
ICCBR
2007
Springer
14 years 3 months ago
From Anomaly Reports to Cases
Abstract. Creating case representations in unsupervised textual case-based reasoning applications is a challenging task because class knowledge is not available to aid selection of...
Stewart Massie, Nirmalie Wiratunga, Susan Craw, Al...
ASSETS
2006
ACM
14 years 3 months ago
From letters to words: efficient stroke-based word completion for trackball text entry
We present a major extension to our previous work on Trackball EdgeWrite—a unistroke text entry method for trackballs—by taking it from a character-level technique to a word-l...
Jacob O. Wobbrock, Brad A. Myers
BMCBI
2010
190views more  BMCBI 2010»
13 years 9 months ago
APIS: accurate prediction of hot spots in protein interfaces by combining protrusion index with solvent accessibility
Background: It is well known that most of the binding free energy of protein interaction is contributed by a few key hot spot residues. These residues are crucial for understandin...
Jun-Feng Xia, Xing-Ming Zhao, Jiangning Song, De-S...
IEEEPACT
2009
IEEE
14 years 3 months ago
Chainsaw: Using Binary Matching for Relative Instruction Mix Comparison
With advances in hardware, instruction set architectures are undergoing continual evolution. As a result, compilers are under constant pressure to adapt and take full advantage of...
Tipp Moseley, Dirk Grunwald, Ramesh Peri