Sciweavers

810 search results - page 121 / 162
» Rule-based Model Extraction from Source Code
Sort
View
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
HIPEAC
2005
Springer
14 years 1 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
IDEAS
2002
IEEE
151views Database» more  IDEAS 2002»
14 years 28 days ago
Completing CAD Data Queries for Visualization
A system has been developed permitting database queries over data extracted from a CAD system where the query result is returned back to the CAD for visualization and analysis. Th...
Milena Gateva Koparanova, Tore Risch
AAI
2006
215views more  AAI 2006»
13 years 8 months ago
Extensive Evaluation of Efficient NLP-Driven Text Classification
Extensive experimental evidence is required to study the impact of text categorization approaches on real data and to assess the performance within operational scenarios. In this ...
Roberto Basili, Alessandro Moschitti, Maria Teresa...
PLDI
2009
ACM
14 years 2 months ago
Parallelizing sequential applications on commodity hardware using a low-cost software transactional memory
Multicore designs have emerged as the mainstream design paradigm for the microprocessor industry. Unfortunately, providing multiple cores does not directly translate into performa...
Mojtaba Mehrara, Jeff Hao, Po-Chun Hsu, Scott A. M...