Sciweavers

580 search results - page 51 / 116
» An Efficient Implementation of an Active Set Method for SVMs
Sort
View
SAS
1994
Springer
136views Formal Methods» more  SAS 1994»
13 years 11 months ago
Constraint-Based Type Inference and Parametric Polymorphism
Constraint-based analysis is a technique for inferring implementation types. Traditionally it has been described using mathematical formalisms. We explain it in a different and mor...
Ole Agesen
IWPC
2002
IEEE
14 years 20 days ago
Mining System-User Interaction Traces for Use Case Models
While code understanding is the primary program comprehension activity, it is quite challenging to recognize the application requirements from code, since they have usually been o...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
ICDM
2003
IEEE
104views Data Mining» more  ICDM 2003»
14 years 1 months ago
Structure Search and Stability Enhancement of Bayesian Networks
Learning Bayesian network structure from large-scale data sets, without any expertspecified ordering of variables, remains a difficult problem. We propose systematic improvements ...
Hanchuan Peng, Chris H. Q. Ding
CIKM
2006
Springer
13 years 9 months ago
Efficiently clustering transactional data with weighted coverage density
In this paper, we propose a fast, memory-efficient, and scalable clustering algorithm for analyzing transactional data. Our approach has three unique features. First, we use the c...
Hua Yan, Keke Chen, Ling Liu