Sciweavers

5463 search results - page 1006 / 1093
» Evaluating algorithms that learn from data streams
Sort
View
SCAM
2002
IEEE
15 years 9 months ago
Precise Call Graph Construction in the Presence of Function Pointers
The use of pointers presents serious problems for software productivity tools for software understanding, restructuring, and testing. Pointers enable indirect memory accesses thro...
Ana Milanova, Atanas Rountev, Barbara G. Ryder
CHES
2006
Springer
87views Cryptology» more  CHES 2006»
15 years 8 months ago
Templates vs. Stochastic Methods
Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of `a-priori' knowledge gained from a profiling step. For a sys...
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof P...
CIKM
2006
Springer
15 years 8 months ago
Topic evolution and social interactions: how authors effect research
We propose a method for discovering the dependency relationships between the topics of documents shared in social networks using the latent social interactions, attempting to answ...
Ding Zhou, Xiang Ji, Hongyuan Zha, C. Lee Giles
DGO
2008
188views Education» more  DGO 2008»
15 years 5 months ago
Enabling synergy between psychology and natural language processing for e-Government: crime reporting and investigative intervie
We are developing an automated crime reporting and investigative interview system. The system incorporates cognitive interview techniques to maximize witness memory recall, and in...
Alicia Iriberri, Chih Hao Ku, Gondy Leroy
ACCV
2009
Springer
15 years 5 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
« Prev « First page 1006 / 1093 Last » Next »