Sciweavers

2917 search results - page 509 / 584
» Adaptation and the effort needed to adapt
Sort
View
ICCV
2011
IEEE
14 years 3 months ago
Segmentation as Selective Search for Object Recognition
Software available at http://disi.unitn.it/~uijlings or http://koen.me/research/ For object recognition, the current state-of-the-art is based on exhaustive search. However, to ...
K van de Sande, J Uijlings, T Gevers, A Smeulders
TKDE
2012
250views Formal Methods» more  TKDE 2012»
13 years 4 months ago
Dense Subgraph Extraction with Application to Community Detection
— This paper presents a method for identifying a set of dense subgraphs of a given sparse graph. Within the main applications of this “dense subgraph problem”, the dense subg...
Jie Chen 0007, Yousef Saad
AAAI
2012
13 years 4 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
ICDE
2006
IEEE
198views Database» more  ICDE 2006»
16 years 3 months ago
Automating the Design and Construction of Query Forms
One of the simplest ways to query a database is through a form, where a user can fill in relevant information and obtain desired results by submitting the form. Designing good sta...
Magesh Jayapandian, H. V. Jagadish
SIGMOD
2009
ACM
144views Database» more  SIGMOD 2009»
16 years 2 months ago
Do we mean the same?: disambiguation of extracted keyword queries for database search
Users often try to accumulate information on a topic of interest from multiple information sources. In this case a user's informational need might be expressed in terms of an...
Elena Demidova, Irina Oelze, Peter Fankhauser