Intelligence analysis

Results: 6441



#Item
51Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models Baljinder Ghotra, Shane McIntosh, Ahmed E. Hassan Software Analysis and Intelligence Lab (SAIL) School of Computing, Queen

Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models Baljinder Ghotra, Shane McIntosh, Ahmed E. Hassan Software Analysis and Intelligence Lab (SAIL) School of Computing, Queen

Add to Reading List

Source URL: sail.cs.queensu.ca

- Date: 2016-01-10 13:12:43
    52New Analysis from Blue Health Intelligence® Highlights Crozer-Chester Medical Center as a Top Performing Facility Published April 2012

    New Analysis from Blue Health Intelligence® Highlights Crozer-Chester Medical Center as a Top Performing Facility Published April 2012

    Add to Reading List

    Source URL: www.bluehealthintelligence.com

    - Date: 2012-04-18 11:50:17
      53824  IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24,

      824 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24,

      Add to Reading List

      Source URL: www.cs.stevens.edu

      - Date: 2007-08-16 15:42:32
        54A Content-Based Approach to Social Network Analysis: a Case Study on Research Communities Dario De Nart, Dante Degl’Innocenti, Marco Basaldella, and Carlo Tasso Artificial Intelligence Lab Department of Mathematics and

        A Content-Based Approach to Social Network Analysis: a Case Study on Research Communities Dario De Nart, Dante Degl’Innocenti, Marco Basaldella, and Carlo Tasso Artificial Intelligence Lab Department of Mathematics and

        Add to Reading List

        Source URL: ircdl2015.unibz.it

        - Date: 2015-01-24 10:43:37
          55The Protecting Cyber Networks Act: Section-By-Section Analysis Section 1: Short Title; Table of Contents. The short title of the Act is the Protecting Cyber Networks Act. Section 2: Sharing of Cyber Threat Indicators and

          The Protecting Cyber Networks Act: Section-By-Section Analysis Section 1: Short Title; Table of Contents. The short title of the Act is the Protecting Cyber Networks Act. Section 2: Sharing of Cyber Threat Indicators and

          Add to Reading List

          Source URL: intelligence.house.gov

          - Date: 2015-04-20 15:16:18
            56IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE,  VOL. 38, NO. 4, APRIL 2016

            IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 38, NO. 4, APRIL 2016

            Add to Reading List

            Source URL: www.cse.cuhk.edu.hk

            - Date: 2016-03-23 04:13:15
              57IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. X, NO. Y, MONTHLatent Log-Linear Models for Handwritten Digit Classification

              IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. X, NO. Y, MONTHLatent Log-Linear Models for Handwritten Digit Classification

              Add to Reading List

              Source URL: thomas.deselaers.de

              - Date: 2014-10-11 09:29:33
                58IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2005 (ACCEPTED)  1 Orientation in Manhattan: Equiprojective Classes and Sequential Estimation

                IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2005 (ACCEPTED) 1 Orientation in Manhattan: Equiprojective Classes and Sequential Estimation

                Add to Reading List

                Source URL: users.isr.ist.utl.pt

                - Date: 2004-12-03 04:35:31
                  59Visual Analytics Support for Intelligence Analysis ¨ ⇤ Carsten Gorg Youn-ah Kang†

                  Visual Analytics Support for Intelligence Analysis ¨ ⇤ Carsten Gorg Youn-ah Kang†

                  Add to Reading List

                  Source URL: www.zcliu.org

                  Language: English - Date: 2016-07-30 20:20:20