Sciweavers

916 search results - page 95 / 184
» Using redundancies to find errors
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 7 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
EMNLP
2009
14 years 7 months ago
Semi-supervised Semantic Role Labeling Using the Latent Words Language Model
Semantic Role Labeling (SRL) has proved to be a valuable tool for performing automatic analysis of natural language texts. Currently however, most systems rely on a large training...
Koen Deschacht, Marie-Francine Moens
ICSE
2004
IEEE-ACM
15 years 10 months ago
Using Compressed Bytecode Traces for Slicing Java Programs
Dynamic slicing is a well-known program debugging technique. Given a program P and input I, it finds all program statements which directly/indirectly affect the values of some var...
Tao Wang, Abhik Roychoudhury
3DIM
2005
IEEE
14 years 11 months ago
Projection-Based Registration Using a Multi-View Camera for Indoor Scene Reconstruction
A registration method is proposed for 3D reconstruction of an indoor environment using a multi-view camera. In general, previous methods have a high computational complexity and a...
Sehwan Kim, Woontack Woo
ICCV
2009
IEEE
1957views Computer Vision» more  ICCV 2009»
16 years 2 months ago
Robust Visual Tracking using L1 Minimization
In this paper we propose a robust visual tracking method by casting tracking as a sparse approximation problem in a particle filter framework. In this framework, occlusion, corru...
Xue Mei, Haibin Ling