Sciweavers

2956 search results - page 231 / 592
» Targeted Data Prefetching
Sort
View
ICDAR
2003
IEEE
15 years 8 months ago
Form Reading based on Form-type Identification and Form-data Recognition
Form reading technology based on form-type identification and form-data recognition is proposed. This technology can solve difficulties in variety for reading different items on f...
Hiroshi Sako, Minenobu Seki, Naohiro Furukawa, His...
ISSRE
2003
IEEE
15 years 8 months ago
Investigating Java Type Analyses for the Receiver-Classes Testing Criterion
This paper investigates the precision of three linearcomplexity type analyses for Java software: Class Hierarchy Analysis (CHA), Rapid Type Analysis (RTA) and Variable Type Analys...
Pierre-Luc Brunelle, Ettore Merlo, Giuliano Antoni...
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
15 years 7 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
LREC
2010
221views Education» more  LREC 2010»
15 years 4 months ago
KALAKA: A TV Broadcast Speech Database for the Evaluation of Language Recognition Systems
A speech database, named KALAKA, was created to support the Albayzin 2008 Evaluation of Language Recognition Systems, organized by the Spanish Network on Speech Technologies from ...
Luis Javier Rodríguez-Fuentes, Mikel Pe&nti...
138
Voted
FLAIRS
2004
15 years 4 months ago
A Faster Algorithm for Generalized Multiple-Instance Learning
In our prior work, we introduced a generalization of the multiple-instance learning (MIL) model in which a bag's label is not based on a single instance's proximity to a...
Qingping Tao, Stephen D. Scott