Sciweavers

305 search results - page 45 / 61
» Classification integration and reclassification using constr...
Sort
View
ICSM
2002
IEEE
15 years 2 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
BMCBI
2005
155views more  BMCBI 2005»
14 years 9 months ago
Mining protein function from text using term-based support vector machines
Background: Text mining has spurred huge interest in the domain of biology. The goal of the BioCreAtIvE exercise was to evaluate the performance of current text mining systems. We...
Simon B. Rice, Goran Nenadic, Benjamin J. Stapley
IJCV
2008
266views more  IJCV 2008»
14 years 9 months ago
Learning to Recognize Objects with Little Supervision
This paper shows (i) improvements over state-of-the-art local feature recognition systems, (ii) how to formulate principled models for automatic local feature selection in object c...
Peter Carbonetto, Gyuri Dorkó, Cordelia Sch...
ICDT
2009
ACM
119views Database» more  ICDT 2009»
15 years 10 months ago
Querying data sources that export infinite sets of views
We study the problem of querying data sources that accept only a limited set of queries, such as sources accessible by Web services which can implement very large (potentially inf...
Bogdan Cautis, Alin Deutsch, Nicola Onose
DPD
1998
117views more  DPD 1998»
14 years 9 months ago
Solving Local Cost Estimation Problem for Global Query Optimization in Multidatabase Systems
To meet users’ growing needs for accessing pre-existing heterogeneous databases, a multidatabase system (MDBS) integrating multiple databases has attracted many researchers recen...
Qiang Zhu, Per-Åke Larson