Sciweavers

706 search results - page 26 / 142
» A Methodology for Evaluating and Selecting Data Mining Softw...
Sort
View
MSR
2005
ACM
14 years 2 months ago
Towards a taxonomy of approaches for mining of source code repositories
Source code version repositories provide a treasure of information encompassing the changes introduced in the system throughout its evolution. These repositories are typically man...
Huzefa H. Kagdi, Michael L. Collard, Jonathan I. M...
KDD
2006
ACM
179views Data Mining» more  KDD 2006»
14 years 9 months ago
Extracting key-substring-group features for text classification
In many text classification applications, it is appealing to take every document as a string of characters rather than a bag of words. Previous research studies in this area mostl...
Dell Zhang, Wee Sun Lee
KES
2010
Springer
13 years 7 months ago
Visualization of Text Streams: A Survey
— This work presents related areas of research, types of data collections that are visualized, technical aspects of generating visualizations, and evaluation methodologies. Exist...
Artur Silic, Bojana Dalbelo Basic
KDD
2004
ACM
135views Data Mining» more  KDD 2004»
14 years 9 months ago
Discovering additive structure in black box functions
Many automated learning procedures lack interpretability, operating effectively as a black box: providing a prediction tool but no explanation of the underlying dynamics that driv...
Giles Hooker
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 11 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...