Sciweavers

887 search results - page 68 / 178
» A Pattern for Softcoded Values
Sort
View
ICML
2009
IEEE
14 years 11 months ago
Domain adaptation from multiple sources via auxiliary classifiers
We propose a multiple source domain adaptation method, referred to as Domain Adaptation Machine (DAM), to learn a robust decision function (referred to as target classifier) for l...
Lixin Duan, Ivor W. Tsang, Dong Xu, Tat-Seng Chua
CHI
2004
ACM
14 years 10 months ago
Studying cooperation and conflict between authors with history flow visualizations
The Internet has fostered an unconventional and powerful style of collaboration: "wiki" web sites, where every visitor has the power to become an editor. In this paper w...
Fernanda B. Viégas, Martin Wattenberg, Kush...
KBSE
2009
IEEE
14 years 4 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
UIST
2009
ACM
14 years 4 months ago
Relaxed selection techniques for querying time-series graphs
Time-series graphs are often used to visualize phenomena that change over time. Common tasks include comparing values at different points in time and searching for specified patte...
Christian Holz, Steven Feiner
AIPR
2008
IEEE
14 years 4 months ago
Temporal structure methods for image-based change analysis
– This paper addresses the exploitation of massive numbers of image-derived change detections. We use the term “change analysis” to emphasize the intelligence value obtained ...
Ray Rimey, Dan Keefe