Sciweavers

3410 search results - page 633 / 682
» Measuring Model Transformation in Model Driven Development
Sort
View
COLT
2000
Springer
15 years 7 months ago
The Role of Critical Sets in Vapnik-Chervonenkis Theory
In the present paper, we present the theoretical basis, as well as an empirical validation, of a protocol designed to obtain effective VC dimension estimations in the case of a si...
Nicolas Vayatis
LISA
2007
15 years 5 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
148
Voted
AIRWEB
2008
Springer
15 years 5 months ago
A large-scale study of automated web search traffic
As web search providers seek to improve both relevance and response times, they are challenged by the ever-increasing tax of automated search query traffic. Third party systems in...
Gregory Buehrer, Jack W. Stokes, Kumar Chellapilla
CCS
2008
ACM
15 years 5 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
LREC
2010
164views Education» more  LREC 2010»
15 years 4 months ago
Evaluating Machine Translation Utility via Semantic Role Labels
We present the methodology that underlies new metrics for semantic machine translation evaluation that we are developing. Unlike widely-used lexical and n-gram based MT evaluation...
Chi-kiu Lo, Dekai Wu