Sciweavers

8177 search results - page 455 / 1636
» Detecting System Emulators
Sort
View
SIGIR
2004
ACM
15 years 10 months ago
Constructing a text corpus for inexact duplicate detection
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. The goal of this work i...
Jack G. Conrad, Cindy P. Schriber
POLICY
2001
Springer
15 years 9 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
CDC
2009
IEEE
158views Control Systems» more  CDC 2009»
15 years 8 months ago
Multiple target detection using Bayesian learning
In this paper, we study multiple target detection using Bayesian learning. The main aim of the paper is to present a computationally efficient way to compute the belief map update ...
Sujit Nair, Konda Reddy Chevva, Houman Owhadi, Jer...
IJCAI
2007
15 years 6 months ago
Automated Heart Wall Motion Abnormality Detection from Ultrasound Images Using Bayesian Networks
Coronary Heart Disease can be diagnosed by measuring and scoring regional motion of the heart wall in ultrasound images of the left ventricle (LV) of the heart. We describe a comp...
Maleeha Qazi, Glenn Fung, Sriram Krishnan, R&oacut...
CASCON
2004
129views Education» more  CASCON 2004»
15 years 5 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy