Sciweavers

1433 search results - page 205 / 287
» An approach to detecting failures automatically
Sort
View
NLDB
2005
Springer
15 years 5 months ago
Natural Language Processing: Mature Enough for Requirements Documents Analysis?
Requirements engineering is the Achilles’ heel of the whole software development process, because requirements documents are often inconsistent and incomplete. Misunderstandings ...
Leonid Kof
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 8 days ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
ANCS
2006
ACM
15 years 5 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
PR
2008
328views more  PR 2008»
14 years 11 months ago
Activity based surveillance video content modelling
This paper tackles the problem of surveillance video content modelling. Given a set of surveillance videos, the aims of our work are twofold: firstly a continuous video is segment...
Tao Xiang, Shaogang Gong
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...