Sciweavers

1486 search results - page 266 / 298
» Firewall Rules Analysis
Sort
View
TSE
2010
148views more  TSE 2010»
14 years 10 months ago
Program Behavior Discovery and Verification: A Graph Grammar Approach
—Discovering program behaviors and functionalities can ease program comprehension and verification. Existing program analysis approaches have used text mining algorithms to infer...
Chunying Zhao, Jun Kong, Kang Zhang
ICIP
2010
IEEE
14 years 9 months ago
Detecting pitching frames in baseball game video using Markov random walk
Pitching is the starting point of an event in baseball games. Hence, locating pitching shots is a critical step in content analysis of a baseball game video. However, pitching fra...
Chih-Yi Chiu, Po-Chih Lin, Wei-Ming Chang, Hsin-Mi...
KI
2010
Springer
14 years 9 months ago
Local Adaptive Extraction of References
Abstract. The accurate extraction of scholarly reference information from scientific publications is essential for many useful applications like BIBTEX management systems or citati...
Peter Klügl, Andreas Hotho, Frank Puppe
REFSQ
2010
Springer
14 years 9 months ago
Towards a Framework for Specifying Software Robustness Requirements Based on Patterns
Abstract. [Context and motivation] With increasing use of software, quality attributes grow in relative importance. Robustness is a software quality attribute that has not received...
Ali Shahrokni, Robert Feldt
DMIN
2009
144views Data Mining» more  DMIN 2009»
14 years 9 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd