Sciweavers

632 search results - page 124 / 127
» Visualization Techniques for the Evaluation of Knowledge Sys...
Sort
View
IWEC
2004
14 years 11 months ago
Development of Extemporaneous Performance by Synthetic Actors in the Rehearsal Process
Autonomous synthetic actors must invent variations of known material in order to perform given only a limited script, and to assist the director with development of the performance...
Tony A. Meyer, Chris H. Messom
IAAI
2003
14 years 11 months ago
Broadcast News Understanding and Navigation
The Broadcast News Editor (BNE) and Broadcast News Navigator (BNN) are fully implemented systems that exploit integrated image, speech, and language processing to support intellig...
Mark T. Maybury
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 1 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
ICDE
2007
IEEE
170views Database» more  ICDE 2007»
15 years 11 months ago
Tree-Pattern Similarity Estimation for Scalable Content-based Routing
With the advent of XML as the de facto language for data publishing and exchange, scalable distribution of XML data to large, dynamic populations of consumers remains an important...
Raphaël Chand, Pascal Felber, Minos N. Garofa...
TKDE
2008
122views more  TKDE 2008»
14 years 9 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu