Sciweavers

411 search results - page 49 / 83
» Evaluation and exploitation of knowledge robustness in knowl...
Sort
View
ER
2009
Springer
166views Database» more  ER 2009»
15 years 4 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
RANLP
2003
14 years 11 months ago
Guessing morphological classes of unknown German nouns
A system for recognition and morphological classification of unknown German nouns is described. It takes raw texts in German as input and outputs a list of the unknown nouns togeth...
Preslav Nakov, Yury Bonev, Galia Angelova, Evelyn ...
ISMIS
2009
Springer
15 years 4 months ago
Semantic-Based Top-k Retrieval for Competence Management
Abstract. We present a knowledge-based system, for skills and talent management, exploiting semantic technologies combined with top-k retrieval techniques. The system provides adva...
Umberto Straccia, Eufemia Tinelli, Simona Colucci,...
ICCV
2007
IEEE
15 years 12 months ago
Methods for space line localization from single catadioptric images: new proposals and comparisons
Line localization from a single image of a central camera is an ill-posed problem unless other constraints or apriori knowledge are exploited. Recently, it has been proved that no...
Vincenzo Caglioti, Simone Gasparini, Pierluigi Tad...
IJISTA
2008
108views more  IJISTA 2008»
14 years 10 months ago
On-the-fly scene acquisition with a handy multi-sensor system
: We present a scene acquisition system which allows for fast and simple acquisition of arbitrarily large 3D environments. We propose a small device which acquires and processes fr...
Benjamin Huhle, Philipp Jenke, Wolfgang Straß...