Sciweavers

39 search results - page 2 / 8
» Provenance and evidence in UniProtKB
Sort
View
DSN
2008
IEEE
13 years 8 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
AAAI
1990
13 years 7 months ago
A Proven Domain-Independent Scientific Function-Finding Algorithm
Programs such as Bacon, Abacus, Coper, Kepler and others are designed to find functional relationships of scientific significance in numerical data without relying on the deep dom...
Cullen Schaffer
ICAIL
2007
ACM
13 years 10 months ago
Formalising argumentative story-based analysis of evidence
In the present paper, we provide a formalised version of a merged argumentative and story-based approach towards the analysis of evidence. As an application, we are able to show h...
F. J. Bex, Henry Prakken, Bart Verheij
PR
2002
103views more  PR 2002»
13 years 6 months ago
Extracting moving shapes by evidence gathering
Many approaches can track objects moving in sequences of images but can su er in occlusion and noise, and often require initialisation. These factors can be handled by techniques ...
Michael G. Grant, Mark S. Nixon, Paul H. Lewis
ECIR
2003
Springer
13 years 7 months ago
Topic Detection and Tracking with Spatio-Temporal Evidence
Topic Detection and Tracking is an event-based information organization task where online news streams are monitored in order to spot new unreported events and link documents with ...
Juha Makkonen, Helena Ahonen-Myka, Marko Salmenkiv...