Sciweavers

794 search results - page 138 / 159
» Optimization Techniques for Semi-Supervised Support Vector M...
Sort
View
94
Voted
ACL
2006
14 years 11 months ago
Minimum Risk Annealing for Training Log-Linear Models
When training the parameters for a natural language system, one would prefer to minimize 1-best loss (error) on an evaluation set. Since the error surface for many natural languag...
David A. Smith, Jason Eisner
ECLIPSE
2007
ACM
15 years 1 months ago
Predicting buggy changes inside an integrated development environment
We present a tool that predicts whether the software under development inside an IDE has a bug. An IDE plugin performs this prediction, using the Change Classification technique t...
Janaki T. Madhavan, E. James Whitehead Jr.
MTA
2010
123views more  MTA 2010»
14 years 8 months ago
Embedded indexing in scalable video coding
Effective encoding and indexing of audiovisual documents are two key aspects for enhancing the multimedia user experience. In this paper we propose the embedding of low-level cont...
Nicola Adami, Alberto Boschetti, Riccardo Leonardi...
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 9 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
92
Voted
CC
2003
Springer
102views System Software» more  CC 2003»
15 years 2 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov