Sciweavers

3556 search results - page 606 / 712
» Can machine learning be secure
Sort
View
ICSE
2010
IEEE-ACM
14 years 3 months ago
Summarizing software artifacts: a case study of bug reports
Many software artifacts are created, maintained and evolved as part of a software development project. As software developers work on a project, they interact with existing projec...
Sarah Rastkar, Gail C. Murphy, Gabriel Murray
NOSSDAV
2010
Springer
14 years 3 months ago
TSync: a new synchronization framework for multi-site 3D tele-immersion
Synchronization is a challenge in the multi-site 3D teleimmersion (3DTI) because it is complicated by the coexistence of highly correlated heterogenous streams from multiple sourc...
Zixia Huang, Wanmin Wu, Klara Nahrstedt, Md. Ahsan...
MLDM
2009
Springer
14 years 2 months ago
Assisting Data Mining through Automated Planning
The induction of knowledge from a data set relies in the execution of multiple data mining actions: to apply filters to clean and select the data, to train different algorithms (...
Fernando Fernández, Daniel Borrajo, Susana ...
ICPP
1997
IEEE
14 years 2 months ago
Automatic Parallelization and Scheduling of Programs on Multiprocessors using CASCH
r The lack of a versatile software tool for parallel program development has been one of the major obstacles for exploiting the potential of high-performance architectures. In this...
Ishfaq Ahmad, Yu-Kwong Kwok, Min-You Wu, Wei Shu
AUSDM
2007
Springer
102views Data Mining» more  AUSDM 2007»
14 years 2 months ago
A Two-Step Classification Approach to Unsupervised Record Linkage
Linking or matching databases is becoming increasingly important in many data mining projects, as linked data can contain information that is not available otherwise, or that woul...
Peter Christen