Sciweavers

130 search results - page 20 / 26
» A Knowledge Engineering Approach for Image Classification ba...
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
WSDM
2010
ACM
215views Data Mining» more  WSDM 2010»
14 years 5 months ago
GeoFolk: Latent spatial semantics in Web 2.0 social media
We describe an approach for multi-modal characterization of social media by combining text features (e.g. tags as a prominent example of short, unstructured text labels) with spat...
Sergej Sizov
MICCAI
2006
Springer
14 years 8 months ago
A New CAD System for the Evaluation of Kidney Diseases Using DCE-MRI
Acute rejection is the most common reason of graft failure after kidney transplantation, and early detection is crucial to survive the transplanted kidney function. In this paper, ...
Ayman El-Baz, Rachid Fahmi, Seniha Esen Yuksel, Al...
IUI
2010
ACM
14 years 4 months ago
Facilitating exploratory search by model-based navigational cues
We present an extension of a computational cognitive model of social tagging and exploratory search called the semantic imitation model. The model assumes a probabilistic represen...
Wai-Tat Fu, Thomas George Kannampallil, Ruogu Kang
ICSM
2007
IEEE
14 years 1 months ago
An Activity-Based Quality Model for Maintainability
Maintainability is a key quality attribute of successful software systems. However, its management in practice is still problematic. Currently, there is no comprehensive basis for...
Florian Deissenboeck, Stefan Wagner, Markus Pizka,...