Sciweavers

417 search results - page 30 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
89
Voted
CHI
2004
ACM
16 years 3 days ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
102
Voted
EUROSYS
2010
ACM
15 years 8 months ago
Execution Synthesis: A Technique for Automated Software Debugging
Debugging real systems is hard, requires deep knowledge of the code, and is time-consuming. Bug reports rarely provide sufficient information, thus forcing developers to turn int...
Cristian Zamfir, George Candea
AVSS
2007
IEEE
14 years 12 months ago
A 2D+3D face identification system for surveillance applications
A novel surveillance system integrating 2D and 3D facial data is presented in this paper, based on a low-cost sensor capable of real-time acquisition of 3D images and associated c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
ICMLA
2009
15 years 8 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
84
Voted
KBSE
2007
IEEE
15 years 6 months ago
Direct-dependency-based software compatibility testing
Software compatibility testing is an important quality assurance task aimed at ensuring that component-based software systems build and/or execute properly across a broad range of...
Il-Chul Yoon, Alan Sussman, Atif M. Memon, Adam A....