Sciweavers

299 search results - page 23 / 60
» Implicit Enumeration of Patterns
Sort
View
CIKM
2009
Springer
14 years 1 months ago
Identifying static analysis techniques for finding non-fix hunks in fix revisions
Mining software repositories for bug detection requires accurate techniques of identifying bug-fix revisions. There have been many researches to find exact bug-fix revisions. Howe...
Yungbum Jung, Hakjoo Oh, Kwangkeun Yi
CORR
2010
Springer
219views Education» more  CORR 2010»
13 years 10 months ago
Clustering high dimensional data using subspace and projected clustering algorithms
: Problem statement: Clustering has a number of techniques that have been developed in statistics, pattern recognition, data mining, and other fields. Subspace clustering enumerate...
Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdull...
JSYML
2008
108views more  JSYML 2008»
13 years 10 months ago
Randomness, lowness and degrees
We say that A LR B if every B-random number is A-random. Intuitively this means that if oracle A can identify some patterns on some real , oracle B can also find patterns on . In o...
George Barmpalias, Andrew E. M. Lewis, Mariya Ivan...
IEEEIAS
2007
IEEE
14 years 4 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
SPATIALCOGNITION
2010
Springer
13 years 8 months ago
Can Mirror-Reading Reverse the Flow of Time?
Abstract. Across cultures, people conceptualize time as if it flows along a horizontal timeline, but the direction of this implicit timeline is culture-specific: in cultures with l...
Daniel Casasanto, Roberto Bottini