Sciweavers

2527 search results - page 337 / 506
» A UML-Based Approach to System Testing
Sort
View
125
Voted
IWDW
2005
Springer
15 years 9 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
PPAM
2005
Springer
15 years 9 months ago
Parallel Query Processing and Edge Ranking of Graphs
Abstract. In this paper we deal with the problem of finding an optimal query execution plan in database systems. We improve the analysis of a polynomial-time approximation algorit...
Dariusz Dereniowski, Marek Kubale
SPIRE
2005
Springer
15 years 9 months ago
XML Retrieval with a Natural Language Interface
Effective information retrieval in XML documents requires the user to have good knowledge of document structure and of some formal query language. XML query languages like XPath a...
Xavier Tannier, Shlomo Geva
120
Voted
COLT
2004
Springer
15 years 9 months ago
Regularization and Semi-supervised Learning on Large Graphs
We consider the problem of labeling a partially labeled graph. This setting may arise in a number of situations from survey sampling to information retrieval to pattern recognition...
Mikhail Belkin, Irina Matveeva, Partha Niyogi
KDD
2004
ACM
173views Data Mining» more  KDD 2004»
15 years 9 months ago
Collaborative Quality Filtering: Establishing Consensus or Recovering Ground Truth?
We present a algorithm based on factor analysis for performing collaborative quality filtering (CQF). Unlike previous approaches to CQF, which estimate the consensus opinion of a...
Jonathan Traupman, Robert Wilensky