Sciweavers

6455 search results - page 1228 / 1291
» Research problems
Sort
View
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
14 years 2 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
GLVLSI
2007
IEEE
194views VLSI» more  GLVLSI 2007»
14 years 2 months ago
Probabilistic maximum error modeling for unreliable logic circuits
Reliability modeling and evaluation is expected to be one of the major issues in emerging nano-devices and beyond 22nm CMOS. Such devices would have inherent propensity for gate f...
Karthikeyan Lingasubramanian, Sanjukta Bhanja
ICDAR
2007
IEEE
14 years 2 months ago
Google Book Search: Document Understanding on a Massive Scale
Unveiled in late 2004, Google Book Search is an ambitious program to make all the world's books discoverable online. The sheer scale of the problem brings a number of unique ...
L. Vincent
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
14 years 1 months ago
Online discovery and maintenance of time series motifs
The detection of repeated subsequences, time series motifs, is a problem which has been shown to have great utility for several higher-level data mining algorithms, including clas...
Abdullah Mueen, Eamonn J. Keogh
AINA
2004
IEEE
14 years 1 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
« Prev « First page 1228 / 1291 Last » Next »