Sciweavers

868 search results - page 32 / 174
» Using concept analysis to detect co-change patterns
Sort
View
WCRE
1999
IEEE
14 years 22 days ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
ICTAI
2007
IEEE
14 years 2 months ago
An Adaptive Distributed Ensemble Approach to Mine Concept-Drifting Data Streams
An adaptive boosting ensemble algorithm for classifying homogeneous distributed data streams is presented. The method builds an ensemble of classifiers by using Genetic Programmi...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
ECCV
2010
Springer
13 years 9 months ago
Intrinsic Regularity Detection in 3D Geometry
Abstract. Automatic detection of symmetries, regularity, and repetitive structures in 3D geometry is a fundamental problem in shape analysis and pattern recognition with applicatio...
Niloy J. Mitra, Alexander M. Bronstein, Michael M....
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 3 months ago
An exploration of climate data using complex networks
To discover patterns in historical data, climate scientists have applied various clustering methods with the goal of identifying regions that share some common climatological beha...
Karsten Steinhaeuser, Nitesh V. Chawla, Auroop R. ...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 1 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...