Sciweavers

1629 search results - page 273 / 326
» A Study of Malcode-Bearing Documents
Sort
View
EWC
2007
87views more  EWC 2007»
13 years 7 months ago
Analysis methods to support design for damping
Methods are documented for active and passive damping studies with capabilities within NX I-deas and NX Nastran (http://www.ugs.com/products/nx/). The focus is on the methods that ...
Mary Baker
RE
2006
Springer
13 years 7 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
JSW
2007
112views more  JSW 2007»
13 years 7 months ago
A Framework for Design Engineering Education with Workflow-based e-Learning System
—Education of design engineering has started to change in response to the advancement of computer technology. This paper proposes a new design engineering educational framework u...
Kazuo Hiekata, Hiroyuki Yamato, Piroon Rojanakamol...
CVPR
2006
IEEE
14 years 9 months ago
Using Dependent Regions for Object Categorization in a Generative Framework
"Bag of words" models have enjoyed much attention and achieved good performances in recent studies of object categorization. In most of these works, local patches are mo...
Gang Wang, Ye Zhang, Fei-Fei Li 0002
ICDE
2009
IEEE
131views Database» more  ICDE 2009»
14 years 9 months ago
Exploring a Few Good Tuples from Text Databases
Information extraction from text databases is a useful paradigm to populate relational tables and unlock the considerable value hidden in plain-text documents. However, information...
Alpa Jain, Divesh Srivastava