Sciweavers

1029 search results - page 160 / 206
» Dependence Anti Patterns
Sort
View
COMCOM
2006
151views more  COMCOM 2006»
13 years 10 months ago
Characteristic analysis of internet traffic from the perspective of flows
The necessity of network traffic monitoring and analysis is growing dramatically with increasing network usage demands from individual users as well as business communities. Most ...
Myung-Sup Kim, Young J. Won, James W. Hong
CORR
2006
Springer
116views Education» more  CORR 2006»
13 years 10 months ago
Quantitative Measurements of the Influence of Participant Roles during Peer Review Meetings
Peer review meetings (PRMs) are formal meetings during which peers systematically analyze artifacts to improve their quality and report on non-conformities. This paper presents an...
Patrick d'Astous, Pierre N. Robillard, Franç...
ISCI
2008
137views more  ISCI 2008»
13 years 10 months ago
Stochastic dominance-based rough set model for ordinal classification
In order to discover interesting patterns and dependencies in data, an approach based on rough set theory can be used. In particular, Dominance-based Rough Set Approach (DRSA) has...
Wojciech Kotlowski, Krzysztof Dembczynski, Salvato...
IJPRAI
2006
100views more  IJPRAI 2006»
13 years 10 months ago
Nearest Neighbor Discriminant Analysis
Linear Discriminant Analysis (LDA) is a popular feature extraction technique in statistical pattern recognition. However, it often suffers from the small sample size problem when ...
Xipeng Qiu, Lide Wu
JOC
2008
92views more  JOC 2008»
13 years 10 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay