Sciweavers

4052 search results - page 759 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
CSFW
2003
IEEE
15 years 5 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
EMNLP
2007
15 years 1 months ago
Bootstrapping Feature-Rich Dependency Parsers with Entropic Priors
One may need to build a statistical parser for a new language, using only a very small labeled treebank together with raw text. We argue that bootstrapping a parser is most promis...
David A. Smith, Jason Eisner
IAJIT
2010
154views more  IAJIT 2010»
14 years 10 months ago
Impact of CMMI Based Software Process Maturity on COCOMO II's Effort Estimation
: The software capability maturity model has become a popular model for enhancing software development processes with the goal of developing high-quality software within budget and...
Majed Al Yahya, Rodina Ahmad, Sai Lee
ICCV
2011
IEEE
13 years 12 months ago
iGroup : Weakly supervised image and video grouping
We present a generic, efficient and iterative algorithm for interactively clustering classes of images and videos. The approach moves away from the use of large hand labelled tra...
Andrew Gilbert, Richard Bowden
WPES
2006
ACM
15 years 5 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov