Sciweavers

521 search results - page 51 / 105
» Discovering Models of Software Processes from Event-Based Da...
Sort
View
ICASSP
2008
IEEE
15 years 4 months ago
Camera and microphone array for 3D audiovisual face data collection
This paper proposes a novel camera/microphone array system capable of capturing dynamic facial expression video with synchronized speech and reconstructing realistic 3D face model...
Yuxiao Hu, Hao Tang, Thomas S. Huang
PRIB
2009
Springer
187views Bioinformatics» more  PRIB 2009»
15 years 2 months ago
Semi-supervised Prediction of Protein Interaction Sentences Exploiting Semantically Encoded Metrics
Protein-protein interaction (PPI) identification is an integral component of many biomedical research and database curation tools. Automation of this task through classification ...
Tamara Polajnar, Mark A. Girolami
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
DASFAA
2004
IEEE
125views Database» more  DASFAA 2004»
15 years 1 months ago
Reducing Communication Cost in a Privacy Preserving Distributed Association Rule Mining
Data mining is a process that analyzes voluminous digital data in order to discover hidden but useful patterns from digital data. However, discovery of such hidden patterns has sta...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
HIPEAC
2005
Springer
15 years 3 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee