Sciweavers

7150 search results - page 1385 / 1430
» Graph-Based Data Mining
Sort
View
JCST
2011
89views more  JCST 2011»
13 years 3 months ago
Software Defect Detection with Rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
Yuan Jiang, Ming Li, Zhi-Hua Zhou
TFS
2011
242views Education» more  TFS 2011»
13 years 3 months ago
Linguistic Summarization Using IF-THEN Rules and Interval Type-2 Fuzzy Sets
—Linguistic summarization (LS) is a data mining or knowledge discovery approach to extract patterns from databases. Many authors have used this technique to generate summaries li...
Dongrui Wu, Jerry M. Mendel
PROMISE
2010
13 years 3 months ago
Case-based reasoning vs parametric models for software quality optimization
Background: There are many data mining methods but few comparisons between them. For example, there are at least two ways to build quality optimizers, programs that find project o...
Adam Brady, Tim Menzies
EMNLP
2011
12 years 8 months ago
Watermarking the Outputs of Structured Prediction with an application in Statistical Machine Translation
We propose a general method to watermark and probabilistically identify the structured outputs of machine learning algorithms. Our method is robust to local editing operations and...
Ashish Venugopal, Jakob Uszkoreit, David Talbot, F...
IACR
2011
87views more  IACR 2011»
12 years 8 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
« Prev « First page 1385 / 1430 Last » Next »