Sciweavers

173 search results - page 27 / 35
» Predicting the severity of a reported bug
Sort
View
AI
1998
Springer
14 years 6 days ago
ELEM2: A Learning System for More Accurate Classifications
We present ELEM2, a new method for inducing classification rules from a set of examples. The method employs several new strategies in the induction and classification processes to ...
Aijun An, Nick Cercone
ECRIME
2007
13 years 12 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
DMIN
2006
239views Data Mining» more  DMIN 2006»
13 years 9 months ago
Mining of Stock Data: Intra- and Inter-Stock Pattern Associative Classification
In this paper, a pattern-based stock data mining approach which transforms the numeric stock data to symbolic sequences, carries out sequential and non-sequential association analy...
Jo Ting, Tak-Chung Fu, Fu-Lai Chung
OSDI
2000
ACM
13 years 9 months ago
Latency Management in Storage Systems
Storage Latency Estimation Descriptors, or SLEDs, are an API that allow applications to understand and take advantage of the dynamic state of a storage system. By accessing data i...
Rodney Van Meter, Minxi Gao
ICPR
2010
IEEE
13 years 8 months ago
Spatiotemporal-Boosted DCT Features for Head and Face Gesture Analysis
Automatic analysis of head gestures and facial expressions is a challenging research area and it has significant applications in humancomputer interfaces. In this study, facial la...
Hatice Çinar Akakin, Bülent Sankur