Sciweavers

499 search results - page 5 / 100
» A Study on Latent Vulnerabilities
Sort
View
ACCV
2009
Springer
14 years 2 months ago
Human Action Recognition Using HDP by Integrating Motion and Location Information
The method based on local features has an advantage that the important local motion feature is represented as bag-of-features, but lacks the location information. Additionally, in ...
Yasuo Ariki, Takuya Tonaru, Tetsuya Takiguchi
ICSE
2012
IEEE-ACM
11 years 9 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
IPPS
1998
IEEE
13 years 11 months ago
Measuring the Vulnerability of Interconnection Networks in Embedded Systems
Studies of the fault-tolerance of graphs have tended to largely concentrate on classical graph connectivity. This measure is very basic, and conveys very little information for des...
Vijay Lakamraju, Zahava Koren, Israel Koren, C. Ma...
KDD
2005
ACM
180views Data Mining» more  KDD 2005»
14 years 27 days ago
Information retrieval based on collaborative filtering with latent interest semantic map
In this paper, we propose an information retrieval model called Latent Interest Semantic Map (LISM), which features retrieval composed of both Collaborative Filtering(CF) and Prob...
Noriaki Kawamae, Katsumi Takahashi
IWPC
2010
IEEE
13 years 5 months ago
On the Equivalence of Information Retrieval Methods for Automated Traceability Link Recovery
Abstract—We present an empirical study to statistically analyze the equivalence of several traceability recovery methods based on Information Retrieval (IR) techniques. The analy...
Rocco Oliveto, Malcom Gethers, Denys Poshyvanyk, A...