Sciweavers

1579 search results - page 98 / 316
» How Good is the Crowd at
Sort
View
ICDM
2008
IEEE
120views Data Mining» more  ICDM 2008»
14 years 2 months ago
Parameter Tuning for Differential Mining of String Patterns
Constraint-based mining has been proven to be extremely useful for supporting actionable pattern discovery. However, useful conjunctions of constraints that support domain driven ...
Jérémy Besson, Christophe Rigotti, I...
ICMCS
2008
IEEE
154views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Using wavpack for real-time audio coding in interactive applications
Highly interactive real-time music applications like network music performance (NMP) currently lack appropriate audio codecs that meet both demands for low delay and high audio qu...
Zefir Kurtisi, Lars C. Wolf
ACSAC
2007
IEEE
14 years 2 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...
ACSC
2007
IEEE
14 years 2 months ago
The CRSS Metric for Package Design Quality
Package design is concerned with the determining the best way to partition the classes in a system into subsystems. A poor package design can adversely affect the quality of a sof...
Hayden Melton, Ewan D. Tempero
CEC
2007
IEEE
14 years 2 months ago
Greedy transformation of evolutionary algorithm search spaces for scheduling problems
— Many scheduling algorithms search the space of possible solutions (schedules), but some instead search the space of permutations of the set of jobs, employing a greedy algorith...
David Joslin, Justin Collins