Sciweavers

101 search results - page 5 / 21
» Complexity Analysis of Weak Multitolerance
Sort
View
CCS
2009
ACM
15 years 4 months ago
Mixed-initiative security agents
Security decision-making is hard for both humans and machines. This is because security decisions are context-dependent, require highly dynamic, specialized knowledge, and require...
Rachel Greenstadt, Sadia Afroz, Michael Brennan
ESOP
2001
Springer
15 years 2 months ago
Entailment with Conditional Equality Constraints
Equality constraints (unification constraints) have widespread use in program analysis, most notably in static polymorphic type systems. Conditional equality constraints extend eq...
Zhendong Su, Alexander Aiken
CCS
2008
ACM
14 years 11 months ago
Is complexity really the enemy of software security?
Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the...
Yonghee Shin, Laurie Williams
77
Voted
DAGM
2003
Springer
15 years 2 months ago
Empirical Analysis of Detection Cascades of Boosted Classifiers for Rapid Object Detection
Recently Viola et al. have introduced a rapid object detection scheme based on a boosted cascade of simple feature classifiers. In this paper we introduce and empirically analysis ...
Rainer Lienhart, Alexander Kuranov, Vadim Pisarevs...
96
Voted
AVBPA
2003
Springer
133views Biometrics» more  AVBPA 2003»
15 years 1 months ago
LUT-Based Adaboost for Gender Classification
There are two main approaches to the problem of gender classification, Support Vector Machines (SVMs) and Adaboost learning methods, of which SVMs are better in correct rate but ar...
Bo Wu, Haizhou Ai, Chang Huang