Sciweavers

2184 search results - page 314 / 437
» Relative Entropy and Statistics
Sort
View
128
Voted
WWW
2010
ACM
15 years 10 months ago
What is disputed on the web?
We present a method for automatically acquiring of a corpus of disputed claims from the web. We consider a factual claim to be disputed if a page on the web suggests both that the...
Rob Ennals, Dan Byler, John Mark Agosta, Barbara R...
150
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier
We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image an...
Muhammad Muzzamil Luqman, Thierry Brouard, Jean-Yv...
WCRE
2009
IEEE
15 years 10 months ago
Benchmarking Lightweight Techniques to Link E-Mails and Source Code
—During the evolution of a software system, a large amount of information, which is not always directly related to the source code, is produced. Several researchers have provided...
Alberto Bacchelli, Marco D'Ambros, Michele Lanza, ...
WETICE
2009
IEEE
15 years 10 months ago
BitTorrent or BitCrunch: Evidence of a Credit Squeeze in BitTorrent?
Abstract—BitTorrent is a highly popular peer-to-peer filesharing protocol. Much BitTorrent activity takes place within private virtual communities called “Private Trackers” ...
David Hales, Rameez Rahman, Boxun Zhang, Michel Me...
ICST
2009
IEEE
15 years 10 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya