Sciweavers

364 search results - page 58 / 73
» Discovering Hidden Evidence
Sort
View
TSE
2008
91views more  TSE 2008»
13 years 8 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
IWC
2008
84views more  IWC 2008»
13 years 7 months ago
I hate you! Disinhibition with virtual partners
This paper presents a descriptive lexical analysis of spontaneous conversations between users and the 2005 Loebner prize winning chatterbot, Jabberwacky. The study was motivated i...
Antonella De Angeli, Sheryl Brahnam
IVC
2010
121views more  IVC 2010»
13 years 7 months ago
Multiview segmentation and tracking of dynamic occluding layers
We present an algorithm for the layered segmentation of video data in multiple views. The approach is based on computing the parameters of a layered representation of the scene in...
Ian D. Reid, Keith Connor
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
ECAI
2010
Springer
13 years 6 months ago
Feature Selection by Approximating the Markov Blanket in a Kernel-Induced Space
The proposed feature selection method aims to find a minimum subset of the most informative variables for classification/regression by efficiently approximating the Markov Blanket ...
Qiang Lou, Zoran Obradovic