Sciweavers

3316 search results - page 607 / 664
» Mining Software Engineering Data
Sort
View
PAMI
2012
13 years 7 days ago
A Least-Squares Framework for Component Analysis
— Over the last century, Component Analysis (CA) methods such as Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Canonical Correlation Analysis (CCA), Lap...
Fernando De la Torre
PAMI
2012
13 years 7 days ago
Quantifying and Transferring Contextual Information in Object Detection
— Context is critical for reducing the uncertainty in object detection. However, context modelling is challenging because there are often many different types of contextual infor...
Wei-Shi Zheng, Shaogang Gong, Tao Xiang
PAMI
2012
13 years 7 days ago
Trainable Convolution Filters and Their Application to Face Recognition
—In this paper, we present a novel image classification system that is built around a core of trainable filter ensembles that we call Volterra kernel classifiers. Our system trea...
Ritwik Kumar, Arunava Banerjee, Baba C. Vemuri, Ha...
ICSE
2012
IEEE-ACM
13 years 6 days ago
Debugger Canvas: Industrial experience with the code bubbles paradigm
—At ICSE 2010, the Code Bubbles team from Brown University and the Code Canvas team from Microsoft Research presented similar ideas for new user experiences for an integrated dev...
Robert DeLine, Andrew Bragdon, Kael Rowan, Jens Ja...
POPL
2006
ACM
15 years 10 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann