Sciweavers

787 search results - page 143 / 158
» Source code analysis and manipulation
Sort
View
KDD
2010
ACM
265views Data Mining» more  KDD 2010»
14 years 1 months ago
Combining predictions for accurate recommender systems
We analyze the application of ensemble learning to recommender systems on the Netflix Prize dataset. For our analysis we use a set of diverse state-of-the-art collaborative filt...
Michael Jahrer, Andreas Töscher, Robert Legen...
ANSS
2004
IEEE
14 years 1 months ago
SENS: A Sensor, Environment and Network Simulator
Recent advances in micro electro-mechanical systems and VLSI lithography have enabled the miniaturization of sensors and controllers. Such minitiarization facilitates the deployme...
Sameer Sundresh, WooYoung Kim, Gul Agha
AUSDM
2008
Springer
212views Data Mining» more  AUSDM 2008»
13 years 12 months ago
Clustering and Classification of Maintenance Logs using Text Data Mining
Spreadsheets applications allow data to be stored with low development overheads, but also with low data quality. Reporting on data from such sources is difficult using traditiona...
Brett Edwards, Michael Zatorsky, Richi Nayak
CVPR
2008
IEEE
13 years 11 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
DSN
2008
IEEE
13 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu