Sciweavers

537 search results - page 102 / 108
» The development process of the UN CEFACT modeling methodolog...
Sort
View
85
Voted
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
15 years 10 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
IWDW
2007
Springer
15 years 4 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
GECCO
2005
Springer
103views Optimization» more  GECCO 2005»
15 years 3 months ago
Maximally rugged NK landscapes contain the highest peaks
NK models provide a family of tunably rugged fitness landscapes used in a wide range of evolutionary computation studies. It is well known that the average height of local optima...
Benjamin Skellett, Benjamin Cairns, Nicholas Geard...
CGF
2008
109views more  CGF 2008»
14 years 10 months ago
Image-based Material Weathering
The appearance manifold [WTL 06] is an efficient approach for modeling and editing time-variant appearance of materials from the BRDF data captured at single time instance. Howeve...
Su Xue, Jiaping Wang, Xin Tong, Qionghai Dai, Bain...