Sciweavers

175 search results - page 9 / 35
» Case Provenance: The Value of Remembering Case Sources
Sort
View
NPL
2010
135views more  NPL 2010»
13 years 6 months ago
A Novel Regularization Learning for Single-View Patterns: Multi-View Discriminative Regularization
The existing Multi-View Learning (MVL) is to discuss how to learn from patterns with multiple information sources and has been proven its superior generalization to the usual Sing...
Zhe Wang, Songcan Chen, Hui Xue, Zhisong Pan
ICSE
2010
IEEE-ACM
14 years 15 days ago
A degree-of-knowledge model to capture source code familiarity
The size and high rate of change of source code comprising a software system make it difficult for software developers to keep up with who on the team knows about particular parts...
Thomas Fritz, Jingwen Ou, Gail C. Murphy, Emerson ...
JITECH
2008
57views more  JITECH 2008»
13 years 7 months ago
Offshore middlemen: transnational intermediation in technology sourcing
The tendency of acquiring information systems and other high technology services from international suppliers continues at unprecedented levels. The primary motivation for the off...
Volker Mahnke, Jonathan Wareham, Niels Bjør...
CORR
2011
Springer
163views Education» more  CORR 2011»
13 years 2 months ago
On Conditions for Linearity of Optimal Estimation
—When is optimal estimation linear? It is well-known that, in the case of a Gaussian source contaminated with Gaussian noise, a linear estimator minimizes the mean square estimat...
Emrah Akyol, Kumar Viswanatha, Kenneth Rose
EUROCRYPT
2005
Springer
14 years 1 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...