Sciweavers

17456 search results - page 3483 / 3492
» Governing with information technologies
Sort
View
TOMACS
2011
139views more  TOMACS 2011»
13 years 4 months ago
The double CFTP method
We consider the problem of the exact simulation of random variables Z that satisfy the distributional identity Z L = V Y + (1 − V )Z, where V ∈ [0, 1] and Y are independent, an...
Luc Devroye, Lancelot F. James
PROMISE
2010
13 years 4 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...
SIGKDD
2010
128views more  SIGKDD 2010»
13 years 4 months ago
On cross-validation and stacking: building seemingly predictive models on random data
A number of times when using cross-validation (CV) while trying to do classification/probability estimation we have observed surprisingly low AUC's on real data with very few...
Claudia Perlich, Grzegorz Swirszcz
SIGKDD
2010
259views more  SIGKDD 2010»
13 years 4 months ago
Activity recognition using cell phone accelerometers
Mobile devices are becoming increasingly sophisticated and the latest generation of smart cell phones now incorporates many diverse and powerful sensors. These sensors include GPS...
Jennifer R. Kwapisz, Gary M. Weiss, Samuel Moore
SIGMOD
2010
ACM
362views Database» more  SIGMOD 2010»
13 years 4 months ago
Data warehousing and analytics infrastructure at facebook
Scalable analysis on large data sets has been core to the functions of a number of teams at Facebook - both engineering and nonengineering. Apart from ad hoc analysis of data and ...
Ashish Thusoo, Zheng Shao, Suresh Anthony, Dhruba ...
« Prev « First page 3483 / 3492 Last » Next »