Sciweavers

1989 search results - page 265 / 398
» Integrity Management in Component Based Systems
Sort
View
ECCV
2008
Springer
16 years 6 months ago
A Dynamic Conditional Random Field Model for Joint Labeling of Object and Scene Classes
Object detection and pixel-wise scene labeling have both been active research areas in recent years and impressive results have been reported for both tasks separately. The integra...
Christian Wojek, Bernt Schiele
TLT
2008
77views more  TLT 2008»
15 years 4 months ago
The Scalable Adapter Design Pattern: Enabling Interoperability Between Educational Software Tools
For many practical learning scenarios, the integrated use of more than one learning tool is educationally beneficial. In these cases, interoperability between learning tools--getti...
Andreas Harrer, Niels Pinkwart, Bruce M. McLaren, ...
ISF
2008
114views more  ISF 2008»
15 years 5 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
16 years 5 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
EUROSEC
2010
ACM
15 years 10 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...