Sciweavers

325 search results - page 52 / 65
» Analysis of the constraint proposal method for two-party neg...
Sort
View
PKDD
2009
Springer
196views Data Mining» more  PKDD 2009»
14 years 1 months ago
Causality Discovery with Additive Disturbances: An Information-Theoretical Perspective
We consider causally sufficient acyclic causal models in which the relationship among the variables is nonlinear while disturbances have linear effects, and show that three princi...
Kun Zhang, Aapo Hyvärinen
EEE
2005
IEEE
14 years 1 months ago
Towards Effective Web Site Designs: A Framework for Modeling, Design Evaluation and Enhancement
Effective Web site design is critical to the success of e-commerce. Therefore, the evaluation and enhancement of a Web site design is of great importance. In this vein, accessibil...
Benjamin Yen, Paul Jen-Hwa Hu, May Wang
ICSM
2002
IEEE
14 years 10 days ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
HT
2000
ACM
13 years 11 months ago
Making a successful case for a hypertextual doctoral dissertation
In August of 1998 I completed the first hypertextual dissertation at Rensselaer Polytechnic Institute. The dissertation was a case study applying methods of rhetorical analysis an...
Christine Boese
KDD
2009
ACM
163views Data Mining» more  KDD 2009»
14 years 8 months ago
Large-scale graph mining using backbone refinement classes
We present a new approach to large-scale graph mining based on so-called backbone refinement classes. The method efficiently mines tree-shaped subgraph descriptors under minimum f...
Andreas Maunz, Christoph Helma, Stefan Kramer