Sciweavers

4466 search results - page 541 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
PLDI
2009
ACM
15 years 11 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
JASIS
2007
110views more  JASIS 2007»
15 years 4 months ago
Google Scholar citations and Google Web/URL citations: A multi-discipline exploratory analysis
In this paper we introduce a new data gathering method “Web/URL Citation” and use it and Google Scholar as a basis to compare traditional and Web-based citation patterns acros...
Kayvan Kousha, Mike Thelwall
ICIP
2010
IEEE
15 years 2 months ago
3D vertebrae segmentation using graph cuts with shape prior constraints
Osteoporosis is a bone disease characterized by a reduction in bone mass, resulting in an increased risk of fractures. To diagnose the osteoporosis accurately, bone mineral densit...
Melih S. Aslan, Asem M. Ali, Dongqing Chen, Ben Ar...
KDD
2005
ACM
118views Data Mining» more  KDD 2005»
16 years 5 months ago
On the use of linear programming for unsupervised text classification
We propose a new algorithm for dimensionality reduction and unsupervised text classification. We use mixture models as underlying process of generating corpus and utilize a novel,...
Mark Sandler
ICSE
2008
IEEE-ACM
16 years 4 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...