Sciweavers

8810 search results - page 1715 / 1762
» Openness
Sort
View
KBSE
2010
IEEE
14 years 10 months ago
MiTV: multiple-implementation testing of user-input validators for web applications
User-input validators play an essential role in guarding a web application against application-level attacks. Hence, the security of the web application can be compromised by defe...
Kunal Taneja, Nuo Li, Madhuri R. Marri, Tao Xie, N...
LATIN
2010
Springer
14 years 10 months ago
On Quadratic Threshold CSPs
A predicate P : {−1, 1}k → {0, 1} can be associated with a constraint satisfaction problem Max CSP(P). P is called “approximation resistant” if Max CSP(P) cannot be approxi...
Per Austrin, Siavosh Benabbas, Avner Magen
MTA
2010
175views more  MTA 2010»
14 years 10 months ago
Building a web-scale image similarity search system
As the number of digital images is growing fast and Content-based Image Retrieval (CBIR) is gaining in popularity, CBIR systems should leap towards Webscale datasets. In this paper...
Michal Batko, Fabrizio Falchi, Claudio Lucchese, D...
PAMI
2010
215views more  PAMI 2010»
14 years 10 months ago
Fusion Moves for Markov Random Field Optimization
—The efficient application of graph cuts to Markov Random Fields (MRFs) with multiple discrete or continuous labels remains an open question. In this paper, we demonstrate one p...
Victor S. Lempitsky, Carsten Rother, Stefan Roth, ...
PE
2010
Springer
114views Optimization» more  PE 2010»
14 years 10 months ago
Analysis of scheduling policies under correlated job sizes
Correlations in traffic patterns are an important facet of the workloads faced by real systems, and one that has far-reaching consequences on the performance and optimization of t...
Varun Gupta, Michelle Burroughs, Mor Harchol-Balte...
« Prev « First page 1715 / 1762 Last » Next »