Sciweavers

208 search results - page 28 / 42
» Detecting Feature Interactions: How Many Components Do We Ne...
Sort
View
APCCM
2007
13 years 10 months ago
A Framework for Managing the Evolution of Business Protocols in Web Services
Web services are loosely coupled software components that are published, discovered, and invoked across the Web. As the use of Web services grows, in order to correctly interact w...
Seung Hwan Ryu, Régis Saint-Paul, Boualem B...
HUC
2007
Springer
14 years 2 months ago
Tracking Free-Weight Exercises
Weight training, in addition to aerobic exercises, is an important component of a balanced exercise program. However, mechanisms for tracking free weight exercises have not yet bee...
Keng-hao Chang, Mike Y. Chen, John Canny
CGA
2005
13 years 8 months ago
Designing a Visualization Framework for Multidimensional Data
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
LREC
2010
144views Education» more  LREC 2010»
13 years 10 months ago
Evaluating Complex Semantic Artifacts
Evaluating complex Natural Language Processing (NLP) systems can prove extremely difficult. In many cases, the best one can do is to evaluate these systems indirectly, by looking ...
Christopher R. Walker, Hannah Copperman