Sciweavers

390 search results - page 58 / 78
» Using Temporal Data for Making Recommendations
Sort
View
110
Voted
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 9 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
153
Voted
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 2 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
PROMISE
2010
14 years 9 months ago
Case-based reasoning vs parametric models for software quality optimization
Background: There are many data mining methods but few comparisons between them. For example, there are at least two ways to build quality optimizers, programs that find project o...
Adam Brady, Tim Menzies
ICDCS
2010
IEEE
15 years 6 months ago
B-SUB: A Practical Bloom-Filter-Based Publish-Subscribe System for Human Networks
—The adoption of portable wireless devices is rapidly rising. The demand for efficient communication protocols amongst these devices is pressing. In this paper, we present a con...
Yaxiong Zhao, Jie Wu
ICPR
2010
IEEE
15 years 5 months ago
Deep Belief Networks for Real-Time Extraction of Tongue Contours from Ultrasound During Speech
Ultrasound has become a useful tool for speech scientists studying mechanisms of language sound production. State-of-the-art methods for extracting tongue contours from ultrasound...
Ian Fasel, Jeff Berry