Sciweavers

508 search results - page 71 / 102
» A Study on the Use of Statistical Tests for Experimentation ...
Sort
View
ALENEX
2003
137views Algorithms» more  ALENEX 2003»
13 years 10 months ago
The Markov Chain Simulation Method for Generating Connected Power Law Random Graphs
Graph models for real-world complex networks such as the Internet, the WWW and biological networks are necessary for analytic and simulation-based studies of network protocols, al...
Christos Gkantsidis, Milena Mihail, Ellen W. Zegur...
ICSE
2005
IEEE-ACM
14 years 9 months ago
Validation methods for calibrating software effort models
COCONUT calibrates effort estimation models using an exhaustive search over the space of calibration parameters in a COCOMO I model. This technique is much simpler than other effo...
Tim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn...
ASIAMS
2008
IEEE
13 years 10 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
13 years 10 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ICPR
2004
IEEE
14 years 10 months ago
Resampling for Face Detection by Self-Adaptive Genetic Algorithm
Over the past ten years, face detection has been thoroughly studied in computer vision research for its interesting applications. However, all of the state-of-the-art statistical ...
Jie Chen, Wen Gao, Xilin Chen