Economics-driven software mining (EDSM) sifts through the repository data to extract information that could be useful for reasoning about not only the technical aspects but also the economics properties related to the...
详细信息
Knowledge reduction is one of the most important issues in rough sets theory. Many works are related to connection-degree-based rough sets model to treat incomplete information systems. However, the model is not used ...
详细信息
Assurance Based Development (ABD) is an approach to the construction of critical computing systems in which the system and an argument that it meets its assurance goals are developed simultaneously. ABD touches all as...
详细信息
This report describes some characteristics of the development team of PostgreSQL that were uncovered by analyzing the history of its software artifacts as recorded by the project's CVS repository.
ISBN:
(纸本)1595933972
This report describes some characteristics of the development team of PostgreSQL that were uncovered by analyzing the history of its software artifacts as recorded by the project's CVS repository.
The IT industry is beginning to mirror a trend of specialization and outsourcing that has been present for decades in other industries, such as the automotive industry. We are beginning to see the emergence of special...
详细信息
ISBN:
(纸本)1595935851
The IT industry is beginning to mirror a trend of specialization and outsourcing that has been present for decades in other industries, such as the automotive industry. We are beginning to see the emergence of specialist service providers, such as CRM services and market places, payment and settlement services, bill presentment services and many others. Organizations increasingly use these services in complex enterprise application systems using web service infrastructures. Unlike the automotive industry, however, the IT industry does not yet have an agreed way to manage web service quality. In this talk, I will focus on managing the service quality of web services that are used across organizational boundaries. I discuss the systematic definition of formal service level agreement languages that support the precise definition of service quality, such as latency, throughput, availability and reliability. I present how service level agreements written in these languages can be used and describe how service level agreements can be policed. I conclude the talk by sketching further research that is necessary before we have a similar grip on quality as other engineering disciplines. Copyright 2006 ACM.
Description Logics (DLs) are gaining more popularity as the foundation of ontology languages for the Semantic Web. As most information in real life is imperfect, there has been an increasing interest recently in exten...
详细信息
The Negative Selection Algorithm is an immunology-inspired algorithm for anomaly detection application. This algorithm has been implemented with different pattern representations and various matching rules and success...
详细信息
ISBN:
(纸本)1595933158
The Negative Selection Algorithm is an immunology-inspired algorithm for anomaly detection application. This algorithm has been implemented with different pattern representations and various matching rules and successfully applied to a broad range of problems. Recent research shows serious problems with this algorithm in terms of both efficiency and effectiveness. In this paper we evaluated the performance of the algorithm constraint-based representation. We argue that the algorithm and problem representations should be considered separately, and that best performance of the algorithm may be obtained by choosing a proper representation.
The two main challenges associated with mining data streams are concept drifting and data noise. Current algorithms mainly depend on the robust of the base classifier or learning ensembles, and have no active mechanis...
详细信息
ISBN:
(纸本)3540459162
The two main challenges associated with mining data streams are concept drifting and data noise. Current algorithms mainly depend on the robust of the base classifier or learning ensembles, and have no active mechanisms to deal noisy. However, noise still can induce the drastic drops in accuracy. In this paper, we present a clustering-based method to filter out hard instances and noise instances from data streams. We also propose a trigger to detect concept drifting and build RobustBoosting, an ensemble classifier, by boosting the hard instances. We evaluated RobustBoosting algorithm and AdaptiveBoosting algorithm [1] on the synthetic and real-life data sets. The experiment results show that the proposed method has substantial advantage over AdaptiveBoosting algorithm in prediction accuracy, and that it can converge to target concepts efficiently with hi h accuracy on datasets with noise level as high as 40%.
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs...
详细信息
Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who p...
详细信息
暂无评论