Sciweavers

2642 search results - page 284 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
DIM
2007
ACM
15 years 8 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
CORR
2008
Springer
135views Education» more  CORR 2008»
15 years 4 months ago
Probabilistic SVM/GMM Classifier for Speaker-Independent Vowel Recognition in Continues Speech
In this paper, we discuss the issues in automatic recognition of vowels in Persian language. The present work focuses on new statistical method of recognition of vowels as a basic...
Mohammad Nazari, Abolghasem Sayadiyan, Seyyed Maji...
JCP
2008
114views more  JCP 2008»
15 years 4 months ago
IntelligenTester - Test Sequence Optimization Framework using Multi-Agents
- Our paper focuses on the generation of optimal test sequences and test cases using Intelligent Agents for highly reliable systems. Test sequences support test case generation for...
D. Jeya Mala, V. Mohan
DATAMINE
2002
125views more  DATAMINE 2002»
15 years 4 months ago
High-Performance Commercial Data Mining: A Multistrategy Machine Learning Application
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...
KBSE
2010
IEEE
15 years 2 months ago
An automated approach for finding variable-constant pairing bugs
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Julia L. Lawall, David Lo