Sciweavers

3370 search results - page 412 / 674
» Correlation Embedding Analysis
Sort
View
138
Voted
CCS
2008
ACM
15 years 5 months ago
Is complexity really the enemy of software security?
Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the...
Yonghee Shin, Laurie Williams
CSSE
2008
IEEE
15 years 5 months ago
Image Retrieval Based on Bit-Plane Distribution Entropy
Based on the analysis of color histogram for image retrieval, a new descriptor, bit-plane distribution entropy (BPDE), is proposed in this paper. The image is firstly divided into ...
Zhao Shan, Wang Hai-tao
111
Voted
AAAI
2010
15 years 4 months ago
Kernelized Sorting for Natural Language Processing
Kernelized sorting is an approach for matching objects from two sources (or domains) that does not require any prior notion of similarity between objects across the two sources. U...
Jagadeesh Jagarlamudi, Seth Juarez, Hal Daum&eacut...
172
Voted
DMIN
2008
241views Data Mining» more  DMIN 2008»
15 years 4 months ago
Leakage Detection by Adaptive Process Modeling
Abstract-- In this paper, we propose an adaptive linear approach for time series modeling and steam line leakage detection. Weighted recursive least squares (WRLS) method is used f...
Jaakko Talonen, Miki Sirola, Jukka Parviainen
115
Voted
CASCON
2006
127views Education» more  CASCON 2006»
15 years 4 months ago
A model and architecture for situation determination
Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current appro...
Graham Thomson, Sotirios Terzis, Paddy Nixon