Sciweavers

65 search results - page 12 / 13
» Automatic Detection of SLS Violation Using Knowledge Based S...
Sort
View
WWW
2008
ACM
14 years 8 months ago
Learning transportation mode from raw gps data for geographic applications on the web
Geographic information has spawned many novel Web applications where global positioning system (GPS) plays important roles in bridging the applications and end users. Learning kno...
Yu Zheng, Like Liu, Longhao Wang, Xing Xie
MICCAI
2009
Springer
14 years 4 months ago
A Two-Level Approach Towards Semantic Colon Segmentation: Removing Extra-Colonic Findings
Abstract. Computer aided detection (CAD) of colonic polyps in computed tomographic colonography has tremendously impacted colorectal cancer diagnosis using 3D medical imaging. It i...
Le Lu, Matthias Wolf, Jianming Liang, Murat Dundar...
ACL
1998
13 years 8 months ago
Towards a Single Proposal in Spelling Correction
The study presented here relies on the integrated use of different kinds of knowledge in order to improve first-guess accuracy in non-word context-sensitive correction for general...
Eneko Agirre, Koldo Gojenola Galletebeitia, Kepa S...
EUROSYS
2010
ACM
14 years 4 months ago
Execution Synthesis: A Technique for Automated Software Debugging
Debugging real systems is hard, requires deep knowledge of the code, and is time-consuming. Bug reports rarely provide sufficient information, thus forcing developers to turn int...
Cristian Zamfir, George Candea
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani