Sciweavers

458 search results - page 76 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
SPIEVIP
2008
15 years 4 months ago
Visual surveillance in maritime port facilities
In this work we propose a method for securing port facilities which uses a set of video cameras to automatically detect various vessel classes moving within buffer zones and off-l...
Mikel D. Rodriguez Sullivan, Mubarak Shah
132
Voted
SOSP
2007
ACM
15 years 10 months ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou
ICDE
2009
IEEE
251views Database» more  ICDE 2009»
16 years 3 months ago
Contextual Ranking of Keywords Using Click Data
The problem of automatically extracting the most interesting and relevant keyword phrases in a document has been studied extensively as it is crucial for a number of applications. ...
Utku Irmak, Vadim von Brzeski, Reiner Kraft
IPPS
2009
IEEE
15 years 8 months ago
Annotation-based empirical performance tuning using Orio
In many scientific applications, significant time is spent tuning codes for a particular highperformance architecture. Tuning approaches range from the relatively nonintrusive (...
Albert Hartono, Boyana Norris, Ponnuswamy Sadayapp...
113
Voted
ISSRE
2003
IEEE
15 years 7 months ago
A New Software Testing Approach Based on Domain Analysis of Specifications and Programs
Partition testing is a well-known software testing technique. This paper shows that partition testing strategies are relatively ineffective in detecting faults related to small sh...
Ruilian Zhao, Michael R. Lyu, Yinghua Min