Sciweavers

4324 search results - page 790 / 865
» A Generalized Representer Theorem
Sort
View
SIGSOFT
2003
ACM
16 years 1 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
123
Voted
ISBI
2004
IEEE
16 years 1 months ago
Towards a Shape Model of White Matter Fiber Bundles Using Diffusion Tensor MRI
White matter fiber bundles of the human brain form a spatial pattern defined by the anatomical and functional architecture. Human brain atlases provide names for individual tracts...
Isabelle Corouge, Guido Gerig, Sylvain Gouttard
183
Voted
ICDT
2009
ACM
130views Database» more  ICDT 2009»
16 years 1 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
102
Voted
WWW
2009
ACM
16 years 1 months ago
Discovering users' specific geo intention in web search
Discovering users' specific and implicit geographic intention in web search can greatly help satisfy users' information needs. We build a geo intent analysis system that...
Xing Yi, Hema Raghavan, Chris Leggetter
119
Voted
WWW
2008
ACM
16 years 1 months ago
Can chinese web pages be classified with english data source?
As the World Wide Web in China grows rapidly, mining knowledge in Chinese Web pages becomes more and more important. Mining Web information usually relies on the machine learning ...
Xiao Ling, Gui-Rong Xue, Wenyuan Dai, Yun Jiang, Q...