Sciweavers

1116 search results - page 154 / 224
» Domination Mining and Querying
Sort
View
AOSD
2006
ACM
14 years 4 months ago
Towards supporting on-demand virtual remodularization using program graphs
OOP style requires programmers to organize their code according to objects (or nouns, using natural language as a metaphor), causing a program’s actions (verbs) to become scatte...
David Shepherd, Lori L. Pollock, K. Vijay-Shanker
COMSUR
2008
108views more  COMSUR 2008»
13 years 10 months ago
A survey of techniques for internet traffic classification using machine learning
The research community has begun looking for IP traffic classification techniques that do not rely on `well known' TCP or UDP port numbers, or interpreting the contents of pac...
Thuy T. T. Nguyen, Grenville J. Armitage
CORR
2008
Springer
92views Education» more  CORR 2008»
13 years 10 months ago
Nonnegative Matrix Factorization via Rank-One Downdate
Nonnegative matrix factorization (NMF) was popularized as a tool for data mining by Lee and Seung in 1999. NMF attempts to approximate a matrix with nonnegative entries by a produ...
Michael Biggs, Ali Ghodsi, Stephen A. Vavasis
CAINE
2009
13 years 8 months ago
Clustering Customer Transactions: A Rough Set Based Approach
An efficient customer behavior analysis is important for good Recommender System. Customer transaction clustering is usually the first step towards the analysis of customer behavi...
Arunava Saha, Darsana Das, Dipanjan Karmakar, Dili...

Publication
200views
12 years 5 months ago
Learning Tags from Unsegmented Videos of Multiple Human Actions
Providing methods to support semantic interaction with growing volumes of video data is an increasingly important challenge for data mining. To this end, there has been some succes...
Timothy Hospedales, Shaogang Gong, Tao Xiang