Sciweavers

6560 search results - page 1296 / 1312
» The Human Context of Information Systems
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Belief theoretic methods for soft and hard data fusion
In many contexts, one is confronted with the problem of extracting information from large amounts of different types soft data (e.g., text) and hard data (from e.g., physics-based...
Thanuka Wickramarathne, Kamal Premaratne, Manohar ...
ICDCS
2012
IEEE
11 years 10 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
CVPR
2009
IEEE
15 years 3 months ago
Learning To Detect Unseen Object Classes by Between-Class Attribute Transfer
We study the problem of object classification when training and test classes are disjoint, i.e. no training examples of the target classes are available. This setup has hardly be...
Christoph H. Lampert, Hannes Nickisch, Stefan Harm...
CVPR
2004
IEEE
14 years 10 months ago
Fast, Integrated Person Tracking and Activity Recognition with Plan-View Templates from a Single Stereo Camera
Copyright 2004 IEEE. Published in Conference on Computer Vision and Pattern Recognition (CVPR-2004), June 27 - July 2, 2004, Washington DC. Personal use of this material is permit...
Michael Harville, Dalong Li
SIGSOFT
2009
ACM
14 years 8 months ago
Improving bug triage with bug tossing graphs
A bug report is typically assigned to a single developer who is then responsible for fixing the bug. In Mozilla and Eclipse, between 37%-44% of bug reports are "tossed" ...
Gaeul Jeong, Sunghun Kim, Thomas Zimmermann
« Prev « First page 1296 / 1312 Last » Next »