Sciweavers

775 search results - page 85 / 155
» Email data cleaning
Sort
View
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 2 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
ML
2010
ACM
138views Machine Learning» more  ML 2010»
13 years 4 months ago
Mining adversarial patterns via regularized loss minimization
Traditional classification methods assume that the training and the test data arise from the same underlying distribution. However, in several adversarial settings, the test set is...
Wei Liu, Sanjay Chawla
ICFP
2007
ACM
14 years 10 months ago
McErlang: a model checker for a distributed functional programming language
We present a model checker for verifying distributed programs written in the Erlang programming language. Providing a model checker for Erlang is especially rewarding since the la...
Hans Svensson, Lars-Åke Fredlund
PERCOM
2007
ACM
14 years 9 months ago
Structural Learning of Activities from Sparse Datasets
Abstract. A major challenge in pervasive computing is to learn activity patterns, such as bathing and cleaning from sensor data. Typical sensor deployments generate sparse datasets...
Fahd Albinali, Nigel Davies, Adrian Friday
ICDM
2005
IEEE
271views Data Mining» more  ICDM 2005»
14 years 3 months ago
HOT SAX: Efficiently Finding the Most Unusual Time Series Subsequence
In this work, we introduce the new problem of finding time series discords. Time series discords are subsequences of a longer time series that are maximally different to all the r...
Eamonn J. Keogh, Jessica Lin, Ada Wai-Chee Fu