Sciweavers

3556 search results - page 569 / 712
» Can machine learning be secure
Sort
View
ISBI
2009
IEEE
14 years 5 months ago
Quantitative Comparison of Spot Detection Methods in Live-Cell Fluorescence Microscopy Imaging
In live-cell fluorescence microscopy imaging, quantitative analysis of biological image data generally involves the detection of many subresolution objects, appearing as diffract...
Ihor Smal, Marco Loog, Wiro J. Niessen, Erik H. W....
IWPC
2009
IEEE
14 years 5 months ago
BugFix: A learning-based tool to assist developers in fixing bugs
We present a tool called BugFix that can assist developers in fixing program bugs. Our tool automatically analyzes the debugging situation at a statement and reports a prioritize...
Dennis Jeffrey, Min Feng, Neelam Gupta, Rajiv Gupt...
JSSPP
2007
Springer
14 years 4 months ago
A Self-optimized Job Scheduler for Heterogeneous Server Clusters
Heterogeneous clusters and grid infrastructures are becoming increasingly popular. In these computing infrastructures, machines have different resources, including memory sizes, d...
Elad Yom-Tov, Yariv Aridor
GECCO
2004
Springer
110views Optimization» more  GECCO 2004»
14 years 4 months ago
Using GP to Model Contextual Human Behavior
To create a realistic environment, some simulations require simulated agents with human behavior pattern. Creating such agents with realistic behavior can be a tedious and time con...
Hans Fernlund, Avelino J. Gonzalez
SIGIR
2003
ACM
14 years 4 months ago
Collaborative filtering via gaussian probabilistic latent semantic analysis
Collaborative filtering aims at learning predictive models of user preferences, interests or behavior from community data, i.e. a database of available user preferences. In this ...
Thomas Hofmann