Sciweavers

1621 search results - page 247 / 325
» Detecting Experiences from Weblogs
Sort
View
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 6 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
ICST
2011
IEEE
12 years 11 months ago
EFindBugs: Effective Error Ranking for FindBugs
—Static analysis tools have been widely used to detect potential defects without executing programs. It helps programmers raise the awareness about subtle correctness issues in t...
Haihao Shen, Jianhong Fang, Jianjun Zhao
CLEF
2007
Springer
14 years 2 months ago
MIRACLE at ImageCLEFphoto 2007: Evaluation of Merging Strategies for Multilingual and Multimedia Information Retrieval
This paper describes the participation of MIRACLE research consortium at the ImageCLEF Photographic Retrieval task of ImageCLEF 2007. For this campaign, the main purpose of our ex...
Julio Villena-Román, Sara Lana-Serrano, Jos...
WSC
2000
13 years 9 months ago
A comparison of five steady-state truncation heuristics for simulation
We compare the performance of five well-known truncation heuristics for mitigating the effects of initialization bias in the output analysis of steady-state simulations. Two of th...
K. Preston White, Michael J. Cobb, Stephen C. Spra...
CVPR
2003
IEEE
14 years 10 months ago
Evaluation of Local Models of Dynamic Backgrounds
Background subtraction is the first step of many video surveillance applications. What is considered background varies by application, and may include regular, systematic, or comp...
Robert Pless, John Larson, Scott Siebers, Ben West...