Sciweavers

670 search results - page 84 / 134
» An Immunological Approach to Change Detection: Theoretical R...
Sort
View
SIGSOFT
2006
ACM
14 years 1 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
JMM2
2008
103views more  JMM2 2008»
13 years 7 months ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
DIS
2004
Springer
14 years 1 months ago
Mining Noisy Data Streams via a Discriminative Model
The two main challenges typically associated with mining data streams are concept drift and data contamination. To address these challenges, we seek learning techniques and models ...
Fang Chu, Yizhou Wang, Carlo Zaniolo
UAI
2008
13 years 9 months ago
Refractor Importance Sampling
In this paper we introduce Refractor Importance Sampling (RIS), an improvement to reduce error variance in Bayesian network importance sampling propagation under evidential reason...
Haohai Yu, Robert van Engelen
AI
2007
Springer
14 years 2 months ago
Learning Network Topology from Simple Sensor Data
In this paper, we present an approach for recovering a topological map of the environment using only detection events from a deployed sensor network. Unlike other solutions to this...
Dimitri Marinakis, Philippe Giguère, Gregor...