Sciweavers

601 search results - page 66 / 121
» A Noisy-Channel Approach to Question Answering
Sort
View
DIM
2008
ACM
13 years 10 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
ESE
2002
114views Database» more  ESE 2002»
13 years 8 months ago
An Industrial Case Study to Examine a Non-Traditional Inspection Implementation for Requirements Specifications
Software inspection is one of the key enablers for quality improvement and defect cost reduction. Although its benefits are shown in many studies, a major obstacle to implement an...
Oliver Laitenberger, Thomas Beil, Thilo Schwinn
VLDB
2002
ACM
122views Database» more  VLDB 2002»
13 years 8 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski
GCB
2009
Springer
141views Biometrics» more  GCB 2009»
14 years 3 months ago
Discovering Temporal Patterns of Differential Gene Expression in Microarray Time Series
: A wealth of time series of microarray measurements have become available over recent years. Several two-sample tests for detecting differential gene expression in these time seri...
Oliver Stegle, Katherine J. Denby, David L. Wild, ...
ACSD
2006
IEEE
80views Hardware» more  ACSD 2006»
14 years 2 months ago
Schedulability Analysis of Petri Nets Based on Structural Properties
A schedule of a Petri Net (PN) represents a set of firing sequences that can be infinitely repeated within a bounded state space, regardless of the outcomes of the nondeterminis...
Cong Liu, Alex Kondratyev, Yosinori Watanabe, Albe...