The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
Predictive data mining typically relies on labeled data without exploiting a much larger amount of available unlabeled data. The goal of this paper is to show that using unlabeled...
Kang Peng, Slobodan Vucetic, Bo Han, Hongbo Xie, Z...
BACKGROUND: Defect predictors learned from static code measures can isolate code modules with a higher than usual probability of defects. AIMS: To improve those learners by focusi...
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
Bagging and boosting are two popular ensemble methods that achieve better accuracy than a single classifier. These techniques have limitations on massive datasets, as the size of t...
Nitesh V. Chawla, Lawrence O. Hall, Kevin W. Bowye...