Sciweavers

2071 search results - page 127 / 415
» An Empirical Evaluation of LFG-DOP
Sort
View
ER
2009
Springer
166views Database» more  ER 2009»
15 years 8 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
15 years 8 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
SEMWEB
2007
Springer
15 years 7 months ago
Measuring Incoherence in Description Logic-Based Ontologies
Ontologies play a core role in the success of the Semantic Web as they provide a shared vocabulary for different resources and applications. Developing an error-free ontology is a...
Guilin Qi, Anthony Hunter
FGR
2006
IEEE
131views Biometrics» more  FGR 2006»
15 years 7 months ago
Haar Features for FACS AU Recognition
We examined the effectiveness of using Haar features and the Adaboost boosting algorithm for FACS action unit (AU) recognition. We evaluated both recognition accuracy and processi...
Jacob Whitehill, Christian W. Omlin
ICDM
2006
IEEE
127views Data Mining» more  ICDM 2006»
15 years 7 months ago
The Relationships Among Various Nonnegative Matrix Factorization Methods for Clustering
The nonnegative matrix factorization (NMF) has been shown recently to be useful for clustering. Various extensions of NMF have also been proposed. In this paper we present an over...
Tao Li, Chris H. Q. Ding