Sciweavers

8614 search results - page 1398 / 1723
» Mining
Sort
View
MSR
2006
ACM
15 years 10 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...
MSR
2006
ACM
15 years 10 months ago
Predicting defect densities in source code files with decision tree learners
With the advent of open source software repositories the data available for defect prediction in source files increased tremendously. Although traditional statistics turned out t...
Patrick Knab, Martin Pinzger, Abraham Bernstein
ACSAC
2005
IEEE
15 years 10 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
DASFAA
2005
IEEE
157views Database» more  DASFAA 2005»
15 years 10 months ago
Adaptively Detecting Aggregation Bursts in Data Streams
Finding bursts in data streams is attracting much attention in research community due to its broad applications. Existing burst detection methods suffer the problems that 1) the p...
Aoying Zhou, Shouke Qin, Weining Qian
ICDM
2005
IEEE
125views Data Mining» more  ICDM 2005»
15 years 10 months ago
Alternate Representation of Distance Matrices for Characterization of Protein Structure
The most suitable method for the automated classification of protein structures remains an open problem in computational biology. In order to classify a protein structure with an...
Keith Marsolo, Srinivasan Parthasarathy
« Prev « First page 1398 / 1723 Last » Next »