Sciweavers

680 search results - page 74 / 136
» A Comparative Study of Threshold-Based Feature Selection Tec...
Sort
View
136
Voted
PKDD
2010
Springer
127views Data Mining» more  PKDD 2010»
15 years 1 months ago
Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs
Defect localisation is essential in software engineering and is an important task in domain-specific data mining. Existing techniques building on call-graph mining can localise dif...
Frank Eichinger, Klaus Krogmann, Roland Klug, Klem...
ICCBR
2007
Springer
15 years 10 months ago
From Anomaly Reports to Cases
Abstract. Creating case representations in unsupervised textual case-based reasoning applications is a challenging task because class knowledge is not available to aid selection of...
Stewart Massie, Nirmalie Wiratunga, Susan Craw, Al...
ASSETS
2006
ACM
15 years 10 months ago
From letters to words: efficient stroke-based word completion for trackball text entry
We present a major extension to our previous work on Trackball EdgeWrite—a unistroke text entry method for trackballs—by taking it from a character-level technique to a word-l...
Jacob O. Wobbrock, Brad A. Myers
BMCBI
2010
190views more  BMCBI 2010»
15 years 4 months ago
APIS: accurate prediction of hot spots in protein interfaces by combining protrusion index with solvent accessibility
Background: It is well known that most of the binding free energy of protein interaction is contributed by a few key hot spot residues. These residues are crucial for understandin...
Jun-Feng Xia, Xing-Ming Zhao, Jiangning Song, De-S...
IEEEPACT
2009
IEEE
15 years 10 months ago
Chainsaw: Using Binary Matching for Relative Instruction Mix Comparison
With advances in hardware, instruction set architectures are undergoing continual evolution. As a result, compilers are under constant pressure to adapt and take full advantage of...
Tipp Moseley, Dirk Grunwald, Ramesh Peri