Sciweavers

4930 search results - page 965 / 986
» Testing a Safety-Critical Application
Sort
View
ENGL
2007
100views more  ENGL 2007»
13 years 6 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
JODL
2006
131views more  JODL 2006»
13 years 6 months ago
Keyframe-based video summarization using Delaunay clustering
Recent advances in technology have made tremendous amount of multimedia information available to the general population. An efficient way of dealing with this new development is t...
Padmavathi Mundur, Yong Rao, Yelena Yesha
ML
2008
ACM
248views Machine Learning» more  ML 2008»
13 years 6 months ago
Feature selection via sensitivity analysis of SVM probabilistic outputs
Feature selection is an important aspect of solving data-mining and machine-learning problems. This paper proposes a feature-selection method for the Support Vector Machine (SVM) l...
Kai Quan Shen, Chong Jin Ong, Xiao Ping Li, Einar ...
KAIS
2006
110views more  KAIS 2006»
13 years 6 months ago
Multi-step density-based clustering
Abstract. Data mining in large databases of complex objects from scientific, engineering or multimedia applications is getting more and more important. In many areas, complex dista...
Stefan Brecheisen, Hans-Peter Kriegel, Martin Pfei...
NLE
2008
108views more  NLE 2008»
13 years 6 months ago
Using automatically labelled examples to classify rhetorical relations: an assessment
Being able to identify which rhetorical relations (e.g., contrast or explanation) hold between spans of text is important for many natural language processing applications. Using ...
Caroline Sporleder, Alex Lascarides