Sciweavers

2962 search results - page 542 / 593
» Reasoning on Association Rules
Sort
View
140
Voted
CODES
2005
IEEE
15 years 6 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
SIGITE
2005
ACM
15 years 6 months ago
A cross-collegiate analysis of software development course content
Many undergraduate IT programs recognize that their graduates will find jobs as software developers. As such, software development (analysis and design) courses are often a core r...
Timothy Burns, Robb Klashner
122
Voted
AUSAI
2005
Springer
15 years 6 months ago
K-Optimal Pattern Discovery: An Efficient and Effective Approach to Exploratory Data Mining
Most data-mining techniques seek a single model that optimizes an objective function with respect to the data. In many real-world applications several models will equally optimize...
Geoffrey I. Webb
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 6 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
106
Voted
ISMIR
2005
Springer
168views Music» more  ISMIR 2005»
15 years 6 months ago
A Novel HMM Approach to Melody Spotting in Raw Audio Recordings
This paper presents a melody spotting system based on Variable Duration Hidden Markov Models (VDHMM’s), capable of locating monophonic melodies in a database of raw audio record...
Aggelos Pikrakis, Sergios Theodoridis