Sciweavers

7766 search results - page 1425 / 1554
» Testing Nondeterminate Systems
Sort
View
KDD
2006
ACM
118views Data Mining» more  KDD 2006»
14 years 9 months ago
Maximum profit mining and its application in software development
While most software defects (i.e., bugs) are corrected and tested as part of the lengthy software development cycle, enterprise software vendors often have to release software pro...
Charles X. Ling, Victor S. Sheng, Tilmann F. W. Br...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 9 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
CHI
2005
ACM
14 years 9 months ago
ECHOES: encouraging companionship, home organization, and entertainment in seniors
The ECHOES project (Encouraging Companionship, Home Organization, and Entertainment in Seniors), is focused on understanding and improving aspects of companionship in senior popul...
Justin Donaldson, Joshua Evnin, Sidharth Saxena
RECOMB
2003
Springer
14 years 9 months ago
Physical network models and multi-source data integration
We develop a new framework for inferring models of transcriptional regulation. The models in this approach, which we call physical models, are constructed on the basis of verifiab...
Chen-Hsiang Yeang, Tommi Jaakkola
« Prev « First page 1425 / 1554 Last » Next »