Sciweavers

8614 search results - page 1345 / 1723
» Mining
Sort
View
IAJIT
2010
81views more  IAJIT 2010»
15 years 3 months ago
Credit Scoring Models Using Soft Computing Methods: A Survey
: During the last fifteen years, soft computing methods have been successfully applied in building powerful and flexible credit scoring models and have been suggested to be a possi...
Adel Lahsasna, Raja Noor Ainon, Teh Ying Wah
IEICET
2010
132views more  IEICET 2010»
15 years 3 months ago
Direct Importance Estimation with a Mixture of Probabilistic Principal Component Analyzers
Estimating the ratio of two probability density functions (a.k.a. the importance) has recently gathered a great deal of attention since importance estimators can be used for solvi...
Makoto Yamada, Masashi Sugiyama, Gordon Wichern, J...
NGC
2008
Springer
165views Communications» more  NGC 2008»
15 years 3 months ago
Hyperlink Recommendation Based on Positive and Negative Association Rules
The new HRS method for hyperlink recommendation based on positive and confined negative association rules is presented in the paper. Discovered with the new PANAMA algorithm rules ...
Przemyslaw Kazienko, Marcin Pilarczyk
ISSRE
2010
IEEE
15 years 3 months ago
Change Bursts as Defect Predictors
—In software development, every change induces a risk. What happens if code changes again and again in some period of time? In an empirical study on Windows Vista, we found that ...
Nachiappan Nagappan, Andreas Zeller, Thomas Zimmer...
KES
2010
Springer
15 years 3 months ago
An Efficient Mechanism for Stemming and Tagging: The Case of Greek Language
In an era that, searching the WWW for information becomes a tedious task, it is obvious that mainly search engines and other data mining mechanisms need to be enhanced with charact...
Giorgos Adam, Konstantinos Asimakis, Christos Bour...
« Prev « First page 1345 / 1723 Last » Next »