Sciweavers

401 search results - page 70 / 81
» Web Application Bypass Testing
Sort
View
ICCBR
1999
Springer
15 years 1 months ago
Case Representation, Acquisition, and Retrieval in SIROCCO
As part of our investigation of how abstract principles are operationalized to facilitate their application to specific fact situations, we have begun to develop and experiment wit...
Bruce M. McLaren, Kevin D. Ashley
CIKM
2008
Springer
14 years 11 months ago
A metric cache for similarity search
Similarity search in metric spaces is a general paradigm that can be used in several application fields. It can also be effectively exploited in content-based image retrieval syst...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
LREC
2010
140views Education» more  LREC 2010»
14 years 11 months ago
mwetoolkit: a Framework for Multiword Expression Identification
This paper presents the Multiword Expression Toolkit (mwetoolkit), an environment for type and language-independent MWE identification from corpora. The mwetoolkit provides a targ...
Carlos Ramisch, Aline Villavicencio, Christian Boi...
GRAPHICSINTERFACE
2004
14 years 10 months ago
Interacting with Big Interfaces on Small Screens: a Comparison of Fisheye, Zoom, and Panning Techniques
Mobile devices with small screens are becoming more common, and will soon be powerful enough to run desktop software. However, the large interfaces of desktop applications do not ...
Carl Gutwin, Chris Fedak
81
Voted
CIDM
2007
IEEE
14 years 9 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...