Sciweavers

2006 search results - page 305 / 402
» Heuristic Security-Testing Methods
Sort
View
WWW
2006
ACM
14 years 10 months ago
Bilingual web page and site readability assessment
Readability assessment is a method to measure the difficulty of a piece of text material, and it is widely used in educational field to assist instructors to prepare appropriate m...
Tak Pang Lau, Irwin King
DCC
2009
IEEE
14 years 10 months ago
Optimization of Correlated Source Coding for Event-Based Monitoring in Sensor Networks
Motivated by the paradigm of event-based monitoring, which can potentially alleviate the inherent bandwidth and energy constraints associated with wireless sensor networks, we con...
Jaspreet Singh, Ankur Saxena, Kenneth Rose, Upaman...
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
14 years 10 months ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin
KDD
2004
ACM
237views Data Mining» more  KDD 2004»
14 years 10 months ago
Bayesian Model-Averaging in Unsupervised Learning From Microarray Data
Unsupervised identification of patterns in microarray data has been a productive approach to uncovering relationships between genes and the biological process in which they are in...
Mario Medvedovic, Junhai Guo
KDD
2002
ACM
186views Data Mining» more  KDD 2002»
14 years 10 months ago
Topic-conditioned novelty detection
Automated detection of the first document reporting each new event in temporally-sequenced streams of documents is an open challenge. In this paper we propose a new approach which...
Yiming Yang, Jian Zhang, Jaime G. Carbonell, Chun ...