Sciweavers

570 search results - page 8 / 114
» When does Co-training Work in Real Data
Sort
View
KDD
2000
ACM
142views Data Mining» more  KDD 2000»
13 years 11 months ago
Automating exploratory data analysis for efficient data mining
Having access to large data sets for the purpose of predictive data mining does not guarantee good models, even when the size of the training data is virtually unlimited. Instead,...
Jonathan D. Becher, Pavel Berkhin, Edmund Freeman
IJVR
2006
199views more  IJVR 2006»
13 years 7 months ago
Interactive Virtual Humans in Real-Time Virtual Environments
In this paper, we will present an overview of existing research in the vast area of IVH systems. We will also present our ongoing work on improving the expressive capabilities of I...
Nadia Magnenat-Thalmann, Arjan Egges
PLDI
2003
ACM
14 years 20 days ago
CCured in the real world
CCured is a program transformation system that adds memory safety guarantees to C programs by verifying statically that memory errors cannot occur and by inserting run-time checks...
Jeremy Condit, Matthew Harren, Scott McPeak, Georg...
DAWAK
2003
Springer
14 years 19 days ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha