Sciweavers

1648 search results - page 327 / 330
» Structuring namespace descriptions
Sort
View
JCS
2010
135views more  JCS 2010»
14 years 8 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
MTA
2010
175views more  MTA 2010»
14 years 8 months ago
Building a web-scale image similarity search system
As the number of digital images is growing fast and Content-based Image Retrieval (CBIR) is gaining in popularity, CBIR systems should leap towards Webscale datasets. In this paper...
Michal Batko, Fabrizio Falchi, Claudio Lucchese, D...
PAMI
2010
210views more  PAMI 2010»
14 years 8 months ago
Multi-Object Analysis of Volume, Pose, and Shape Using Statistical Discrimination
Abstract— One goal of statistical shape analysis is the discrimination between two populations of objects. In this paper, we present results of discriminant analysis on multi-obj...
Kevin Gorczowski, Martin Styner, Ja-Yeon Jeong, J....
PPDP
2010
Springer
14 years 8 months ago
Type inference in intuitionistic linear logic
We study the type checking and type inference problems for intuitionistic linear logic: given a System F typed λ-term, (i) for an alleged linear logic type, determine whether the...
Patrick Baillot, Martin Hofmann
WCRE
2010
IEEE
14 years 8 months ago
Predicting Re-opened Bugs: A Case Study on the Eclipse Project
—Bug fixing accounts for a large amount of the software maintenance resources. Generally, bugs are reported, fixed, verified and closed. However, in some cases bugs have to be...
Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid ...