Sciweavers

2795 search results - page 373 / 559
» Recommendations on recommendations
Sort
View
ICCCN
2008
IEEE
14 years 4 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ICDM
2008
IEEE
184views Data Mining» more  ICDM 2008»
14 years 4 months ago
Bayesian Co-clustering
In recent years, co-clustering has emerged as a powerful data mining tool that can analyze dyadic data connecting two entities. However, almost all existing co-clustering techniqu...
Hanhuai Shan, Arindam Banerjee
ICMCS
2008
IEEE
169views Multimedia» more  ICMCS 2008»
14 years 4 months ago
Encoding optimization of low resolution soccer video sequences
In this article we propose an optimization method for encoding low resolution soccer video sequences. The considered video codec is the state of the art H.264/AVC, as recommended ...
Luca Superiori, Markus Rupp
ISSRE
2008
IEEE
14 years 4 months ago
Cost Curve Evaluation of Fault Prediction Models
Prediction of fault prone software components is one of the most researched problems in software engineering. Many statistical techniques have been proposed but there is no consen...
Yue Jiang, Bojan Cukic, Tim Menzies
IWPC
2008
IEEE
14 years 4 months ago
Reusing Program Investigation Knowledge for Code Understanding
Software maintenance tasks typically involve an important amount of program investigation effort on the part of software developers. To what extent can we benefit from prior prog...
Martin P. Robillard, Putra Manggala