Sciweavers

1134 search results - page 188 / 227
» Analyzing Mapping Extraction Approaches
Sort
View
155
Voted
ICST
2011
IEEE
14 years 7 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
109
Voted
CHI
2011
ACM
14 years 7 months ago
Identifying emotional states using keystroke dynamics
The ability to recognize emotions is an important part of building intelligent computers. Emotionally-aware systems would have a rich context from which to make appropriate decisi...
Clayton Epp, Michael Lippold, Regan L. Mandryk
159
Voted
ICCV
2011
IEEE
14 years 3 months ago
Illumination Demultiplexing from a Single Image
A class of techniques in computer vision and graphics is based on capturing multiple images of a scene under different illumination conditions. These techniques explore variations...
Christine Chen, Daniel Vaquero, Matthew Turk
169
Voted
CORR
2012
Springer
183views Education» more  CORR 2012»
13 years 11 months ago
Learning Determinantal Point Processes
Determinantal point processes (DPPs), which arise in random matrix theory and quantum physics, are natural models for subset selection problems where diversity is preferred. Among...
Alex Kulesza, Ben Taskar
137
Voted
PPOPP
2012
ACM
13 years 11 months ago
DOJ: dynamically parallelizing object-oriented programs
We present Dynamic Out-of-Order Java (DOJ), a dynamic parallelization approach. In DOJ, a developer annotates code blocks as tasks to decouple these blocks from the parent executi...
Yong Hun Eom, Stephen Yang, James Christopher Jeni...