Sciweavers

2299 search results - page 181 / 460
» Logical Data Expiration
Sort
View
INTERSPEECH
2010
14 years 11 months ago
Data-dependent evaluator modeling and its application to emotional valence classification from speech
Practical supervised learning scenarios involving subjectively evaluated data have multiple evaluators, each giving their noisy version of the hidden ground truth. Majority logic ...
Kartik Audhkhasi, Shrikanth S. Narayanan
TLDI
2003
ACM
110views Formal Methods» more  TLDI 2003»
15 years 9 months ago
Type-safe multithreading in cyclone
We extend Cyclone, a type-safe polymorphic language at vel of abstraction, with threads and locks. Data races can violate type safety in Cyclone. An extended type system staticall...
Dan Grossman
IJNSEC
2008
75views more  IJNSEC 2008»
15 years 4 months ago
A Key Management Scheme for Hierarchical Access Control in Group Communication
In group communication, users often have different access rights to multiple data streams. Based on the access relation of users and data streams, users can form partially ordered...
Qiong Zhang, Yuke Wang, Jason P. Jue
KDD
2009
ACM
202views Data Mining» more  KDD 2009»
16 years 4 months ago
Correlated itemset mining in ROC space: a constraint programming approach
Correlated or discriminative pattern mining is concerned with finding the highest scoring patterns w.r.t. a correlation measure (such as information gain). By reinterpreting corre...
Siegfried Nijssen, Tias Guns, Luc De Raedt
SPIN
2004
Springer
15 years 9 months ago
Model-Driven Software Verification
Abstract. In the classic approach to logic model checking, software verification requires a manually constructed artifact (the model) to be written in the language that is accepted...
Gerard J. Holzmann, Rajeev Joshi