Sciweavers

1220 search results - page 193 / 244
» Guided Data Repair
Sort
View
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
14 years 1 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
GRAPHITE
2007
ACM
14 years 1 months ago
A shape hierarchy for 3D modelling from video
This paper describes an interactive method for generating a model of a scene from image data. The method uses the camera parameters and point cloud typically generated by structur...
Anton van den Hengel, Anthony R. Dick, Thorsten Th...
HICSS
2007
IEEE
124views Biometrics» more  HICSS 2007»
14 years 1 months ago
Validation in Internet Survey Research: Reviews and Future Suggestions
In recent years, Internet surveys have been widely used by researchers and companies as a means of data collection. However, few IS studies have discussed the validation of Intern...
Hui-Chih Wang, Her-Sen Doong
CCGRID
2004
IEEE
14 years 1 months ago
Predicting job start times on clusters
In a Computational Grid which consists of many computer clusters, job start time predictions are useful to guide resource selections and balance the workload distribution. However...
Hui Li, David L. Groep, Jeffrey Templon, Lex Wolte...
ENC
2004
IEEE
14 years 1 months ago
A Method Based on Genetic Algorithms and Fuzzy Logic to Induce Bayesian Networks
A method to induce bayesian networks from data to overcome some limitations of other learning algorithms is proposed. One of the main features of this method is a metric to evalua...
Manuel Martínez-Morales, Ramiro Garza-Dom&i...