Sciweavers

706 search results - page 61 / 142
» A Methodology for Evaluating and Selecting Data Mining Softw...
Sort
View
MSR
2006
ACM
14 years 1 months ago
Fine grained indexing of software repositories to support impact analysis
Versioned and bug-tracked software systems provide a huge amount of historical data regarding source code changes and issues management. In this paper we deal with impact analysis...
Gerardo Canfora, Luigi Cerulo
DATE
2004
IEEE
143views Hardware» more  DATE 2004»
13 years 11 months ago
Fault-Tolerant Deployment of Embedded Software for Cost-Sensitive Real-Time Feedback-Control Applications
Designing cost-sensitive real-time control systems for safetycritical applications requires a careful analysis of the cost/coverage trade-offs of fault-tolerant solutions. This fu...
Claudio Pinello, Luca P. Carloni, Alberto L. Sangi...
WS
2010
ACM
13 years 6 months ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...
WEBI
2009
Springer
14 years 2 months ago
Rank Aggregation Based Text Feature Selection
Filtering feature selection method (filtering method, for short) is a well-known feature selection strategy in pattern recognition and data mining. Filtering method outperforms ot...
Ou Wu, Haiqiang Zuo, Mingliang Zhu, Weiming Hu, Ju...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 3 days ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley