Sciweavers

2582 search results - page 425 / 517
» Earth Observation Data Processing in Distributed Systems
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 5 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
RECSYS
2010
ACM
15 years 1 months ago
Eye-tracking product recommenders' usage
Recommender systems have emerged as an effective decision tool to help users more easily and quickly find products that they prefer, especially in e-commerce environments. However...
Sylvain Castagnos, Nicolas Jones, Pearl Pu
SAC
2004
ACM
15 years 7 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
139
Voted
ICASSP
2011
IEEE
14 years 5 months ago
Improving acoustic event detection using generalizable visual features and multi-modality modeling
Acoustic event detection (AED) aims to identify both timestamps and types of multiple events and has been found to be very challenging. The cues for these events often times exist...
Po-Sen Huang, Xiaodan Zhuang, Mark Hasegawa-Johnso...
ICRA
2006
IEEE
132views Robotics» more  ICRA 2006»
15 years 7 months ago
Speeding-up Multi-robot Exploration by Considering Semantic Place Information
— In this paper, we consider the problem of exploring an unknown environment with a team of mobile robots. One of the key issues in multi-robot exploration is how to assign targe...
Cyrill Stachniss, Óscar Martínez Moz...