Sciweavers

718 search results - page 114 / 144
» Toward Models for Forensic Analysis
Sort
View
CIVR
2008
Springer
127views Image Analysis» more  CIVR 2008»
14 years 11 months ago
Performance evaluation of relevance feedback methods
In this paper we review the evaluation of relevance feedback methods for content-based image retrieval systems. We start out by presenting an overview of current common practice, ...
Mark J. Huiskes, Michael S. Lew
LREC
2010
179views Education» more  LREC 2010»
14 years 11 months ago
Building a Bank of Semantically Encoded Narratives
We propose a methodology for a novel type of discourse annotation whose model is tuned to the analysis of a text as narrative. This is intended to be the basis of a "story ba...
David K. Elson, Kathleen McKeown
92
Voted
WCRE
2010
IEEE
14 years 8 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...
HIPC
2009
Springer
14 years 7 months ago
Impact of early abort mechanisms on lock-based software transactional memory
Software transactional memory (STM) is an emerging concurrency control mechanism for shared memory accesses. Early abort is one of the important techniques to improve the executio...
Zhengyu He, Bo Hong
81
Voted
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 4 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...