Sciweavers

58 search results - page 10 / 12
» Experimental Study of FPT Algorithms for the Directed Feedba...
Sort
View
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
13 years 11 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
NIPS
2007
13 years 9 months ago
A Game-Theoretic Approach to Apprenticeship Learning
We study the problem of an apprentice learning to behave in an environment with an unknown reward function by observing the behavior of an expert. We follow on the work of Abbeel ...
Umar Syed, Robert E. Schapire
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 9 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 8 months ago
Turning down the noise in the blogosphere
In recent years, the blogosphere has experienced a substantial increase in the number of posts published daily, forcing users to cope with information overload. The task of guidin...
Khalid El-Arini, Gaurav Veda, Dafna Shahaf, Carlos...
MICCAI
2008
Springer
14 years 8 months ago
Cortical Surface Thickness as a Classifier: Boosting for Autism Classification
We study the problem of classifying an autistic group from controls using structural image data alone, a task that requires a clinical interview with a psychologist. Because of the...
Vikas Singh, Lopamudra Mukherjee, Moo K. Chung