Sciweavers

3305 search results - page 173 / 661
» Can we Rely on SQL
Sort
View
ISMIS
2011
Springer
13 years 1 months ago
Evaluation of Feature Combination Approaches for Text Categorisation
Text categorisation relies heavily on feature selection. Both the possible reduction in dimensionality as well as improvements in classification performance are highly desirable. ...
Robert Neumayer, Kjetil Nørvåg
CSFW
2011
IEEE
12 years 10 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
TMA
2012
Springer
268views Management» more  TMA 2012»
12 years 6 months ago
Identifying Skype Nodes in the Network Exploiting Mutual Contacts
Abstract. In this paper we present an algorithm that is able to progressively discover nodes of a Skype overlay P2P network. Most notably, super nodes in the network core. Starting...
Jan Jusko, Martin Rehák

Publication
172views
12 years 4 months ago
Beyond Straight Lines - Object Detection using Curvature
We present an approach that directly uses curvature cues in a discriminative way to perform object recognition. We show that integrating curvature information substantially impr...
Antonio Monroy, Angela Eigenstetter and Björn Omm...
AAAI
2012
12 years 24 days ago
A Search Algorithm for Latent Variable Models with Unbounded Domains
This paper concerns learning and prediction with probabilistic models where the domain sizes of latent variables have no a priori upper-bound. Current approaches represent prior d...
Michael Chiang, David Poole