Sciweavers

507 search results - page 76 / 102
» Two fuzzy probability measures
Sort
View
HPCA
2009
IEEE
14 years 10 months ago
Eliminating microarchitectural dependency from Architectural Vulnerability
The Architectural Vulnerability Factor (AVF) of a hardware structure is the probability that a fault in the structure will affect the output of a program. AVF captures both microa...
Vilas Sridharan, David R. Kaeli
KDD
2005
ACM
73views Data Mining» more  KDD 2005»
14 years 10 months ago
Using relational knowledge discovery to prevent securities fraud
We describe an application of relational knowledge discovery to a key regulatory mission of the National Association of Securities Dealers (NASD). NASD is the world's largest...
Özgür Simsek, David Jensen, Henry G. Gol...
COCO
2009
Springer
119views Algorithms» more  COCO 2009»
14 years 4 months ago
An Approximation Algorithm for Approximation Rank
One of the strongest techniques available for showing lower bounds on quantum communication complexity is the logarithm of the approximation rank of the communication matrix— th...
Troy Lee, Adi Shraibman
CISS
2008
IEEE
14 years 4 months ago
Unsupervised distributional anomaly detection for a self-diagnostic speech activity detector
— One feature that classification algorithms typically lack is the ability to know what they do not know. With this knowledge an algorithm would be able to operate in any domain...
Nash M. Borges, Gerard G. L. Meyer
ICSM
2007
IEEE
14 years 4 months ago
Empirical Evidence for SOC Dynamics in Software Evolution
We examine eleven large open source software systems and present empirical evidence for the existence of fractal structures in software evolution. In our study, fractal structures...
Jingwei Wu, Richard C. Holt, Ahmed E. Hassan