Sciweavers

539 search results - page 33 / 108
» On Modelling User Observations in the UTP
Sort
View
COMPSAC
2008
IEEE
14 years 2 months ago
Implicit Social Network Model for Predicting and Tracking the Location of Faults
— In software testing and maintenance activities, the observed faults and bugs are reported in bug report managing systems (BRMS) for further analysis and repair. According to th...
Ing-Xiang Chen, Cheng-Zen Yang, Ting-Kun Lu, Hojun...
IWSEC
2009
Springer
14 years 2 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
IEEEVAST
2010
13 years 2 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen
NIPS
2007
13 years 9 months ago
Probabilistic Matrix Factorization
Many existing approaches to collaborative filtering can neither handle very large datasets nor easily deal with users who have very few ratings. In this paper we present the Prob...
Ruslan Salakhutdinov, Andriy Mnih
ICC
2009
IEEE
139views Communications» more  ICC 2009»
14 years 2 months ago
Ergodic Secrecy Capacity Region of the Fading Broadcast Channel
— We consider the fading broadcast channel from a secrecy point of view. In this channel, each user views the other user as an eavesdropper, and wants to keep its information as ...
Ersen Ekrem, Sennur Ulukus