Sciweavers

6975 search results - page 1318 / 1395
» Personal Information Agent
Sort
View
CCS
2007
ACM
15 years 6 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
CIKM
2007
Springer
15 years 6 months ago
Leveraging context in user-centric entity detection systems
A user-centric entity detection system is one in which the primary consumer of the detected entities is a person who can perform actions on the detected entities (e.g. perform a s...
Vadim von Brzeski, Utku Irmak, Reiner Kraft
CIVR
2007
Springer
160views Image Analysis» more  CIVR 2007»
15 years 6 months ago
Automatic image annotation by an iterative approach: incorporating keyword correlations and region matching
Automatic image annotation automatically labels image content with semantic keywords. For instance, the Relevance Model estimates the joint probability of the keyword and the imag...
Xiangdong Zhou, Mei Wang, Qi Zhang, Junqi Zhang, B...
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
15 years 6 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003
ECTEL
2007
Springer
15 years 6 months ago
Scruffy Technologies to Enable (Work-integrated) Learning
Abstract. The goal of the APOSDLE (Advanced Process-Oriented SelfDirected Learning environment) project is to support work-integrated learning of knowledge workers. We argue that w...
Stefanie N. Lindstaedt, Peter Scheir, Armin Ulbric...
« Prev « First page 1318 / 1395 Last » Next »