Sciweavers

424 search results - page 79 / 85
» Integrating Data Mining and Agent Based Modeling and Simulat...
Sort
View
HIPEAC
2005
Springer
14 years 1 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
14 years 1 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
AAAI
2010
13 years 9 months ago
Visual Contextual Advertising: Bringing Textual Advertisements to Images
Advertising in the case of textual Web pages has been studied extensively by many researchers. However, with the increasing amount of multimedia data such as image, audio and vide...
Yuqiang Chen, Ou Jin, Gui-Rong Xue, Jia Chen, Qian...
CSDA
2008
128views more  CSDA 2008»
13 years 7 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
WS
2010
ACM
13 years 5 months ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...