Sciweavers

131 search results - page 13 / 27
» Understanding Common Priors under Incomplete Information
Sort
View
TSE
1998
115views more  TSE 1998»
13 years 7 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
14 years 8 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu
BIOINFORMATICS
2010
138views more  BIOINFORMATICS 2010»
13 years 8 months ago
Robust unmixing of tumor states in array comparative genomic hybridization data
Motivation: Tumorigenesis is an evolutionary process by which tumor cells acquire sequences of mutations leading to increased growth, invasiveness, and eventually metastasis. It i...
David Tolliver, Charalampos E. Tsourakakis, Ayshwa...
ISPW
2005
IEEE
14 years 1 months ago
Evolving Defect "Folklore": A Cross-Study Analysis of Software Defect Behavior
Abstract. Answering “macro-process” research issues – which require understanding how development processes fit or do not fit in different organizational systems and environm...
Victor R. Basili, Forrest Shull
AAAI
2012
11 years 10 months ago
Supervised Probabilistic Robust Embedding with Sparse Noise
Many noise models do not faithfully reflect the noise processes introduced during data collection in many real-world applications. In particular, we argue that a type of noise re...
Yu Zhang, Dit-Yan Yeung, Eric P. Xing