Sciweavers

1092 search results - page 163 / 219
» Do summaries help
Sort
View
CVPR
2012
IEEE
13 years 6 months ago
Visual tracking via adaptive structural local sparse appearance model
Sparse representation has been applied to visual tracking by finding the best candidate with minimal reconstruction error using target templates. However most sparse representati...
Xu Jia, Huchuan Lu, Ming-Hsuan Yang
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 6 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
ACL
2012
13 years 6 months ago
Social Event Radar: A Bilingual Context Mining and Sentiment Analysis Summarization System
Social Event Radar is a new social networking-based service platform, that aim to alert as well as monitor any merchandise flaws, food-safety related issues, unexpected eruption o...
Wen-Tai Hsieh, Chen Ming Wu, Tsun Ku, Seng-cho Tim...
ICSE
2012
IEEE-ACM
13 years 6 months ago
Detecting similar software applications
—Although popular text search engines allow users to retrieve similar web pages, source code search engines do not have this feature. Detecting similar applications is a notoriou...
Collin McMillan, Mark Grechanik, Denys Poshyvanyk
SIGSOFT
2006
ACM
16 years 4 months ago
Failure proximity: a fault localization-based approach
Recent software systems usually feature an automated failure reporting system, with which a huge number of failing traces are collected every day. In order to prioritize fault dia...
Chao Liu 0001, Jiawei Han