Sciweavers

3883 search results - page 663 / 777
» Design mentoring based on design evolution analysis
Sort
View
143
Voted
ISSTA
2004
ACM
15 years 10 months ago
Model checking XML manipulating software
The use of XML as the de facto data exchange standard has allowed integration of heterogeneous web based software systems regardless of implementation platforms and programming la...
Xiang Fu, Tevfik Bultan, Jianwen Su
MM
2004
ACM
151views Multimedia» more  MM 2004»
15 years 10 months ago
Grouping web image search result
In this paper, we propose a Web image search result organizing method to facilitate user browsing. We formalize this problem as a salient image region pattern extraction problem. ...
Xin-Jing Wang, Wei-Ying Ma, Qi-Cai He, Xing Li
135
Voted
MM
2004
ACM
112views Multimedia» more  MM 2004»
15 years 10 months ago
Multi-model similarity propagation and its application for web image retrieval
In this paper, we propose an iterative similarity propagation approach to explore the inter-relationships between Web images and their textual annotations for image retrieval. By ...
Xin-Jing Wang, Wei-Ying Ma, Gui-Rong Xue, Xing Li
160
Voted
MOBICOM
2004
ACM
15 years 10 months ago
Modeling mobility for vehicular ad-hoc networks
Without realistic modeling of node mobility, simulation evaluation of performance of mobile ad hoc networks may not correlate well with performance in a real deployment. In this p...
Amit Kumar Saha, David B. Johnson
113
Voted
NSPW
2004
ACM
15 years 10 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman