Sciweavers

874 search results - page 124 / 175
» Evaluation Methods for Focused Crawling
Sort
View
IEEEARES
2007
IEEE
15 years 10 months ago
Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network
The issue of information security has attracted increasing attention in recent years. In network attack and defense scenarios, attackers and defenders constantly change their resp...
Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin
ICWL
2007
Springer
15 years 10 months ago
A Cloze Test Authoring System and Its Automation
Abstract. This paper presents a pilot system and discusses its possible extensions. In the first sections, we present a web-based test authoring system for English grammar and voca...
Ayako Hoshino, Hiroshi Nakagawa
ISSTA
2006
ACM
15 years 10 months ago
DSD-Crasher: a hybrid analysis tool for bug finding
DSD-Crasher is a bug finding tool that follows a three-step approach to program analysis: D. Capture the program’s intended execution behavior with dynamic invariant detection....
Christoph Csallner, Yannis Smaragdakis
AMFG
2005
IEEE
181views Biometrics» more  AMFG 2005»
15 years 10 months ago
An Integrated Two-Stage Framework for Robust Head Pose Estimation
Abstract. Subspace analysis has been widely used for head pose estimation. However, such techniques are usually sensitive to data alignment and background noise. In this paper a tw...
Junwen Wu, Mohan M. Trivedi
IMC
2004
ACM
15 years 9 months ago
Bandwidth estimation in broadband access networks
There has been much work on developing techniques for estimating the capacity and the available bandwidth of network paths based on end-point measurements. The focus has primarily...
Karthik Lakshminarayanan, Venkata N. Padmanabhan, ...