Sciweavers

6412 search results - page 1167 / 1283
» Human Active Learning
Sort
View
ICDM
2002
IEEE
109views Data Mining» more  ICDM 2002»
14 years 2 months ago
Using Text Mining to Infer Semantic Attributes for Retail Data Mining
Current Data Mining techniques usually do not have a mechanism to automatically infer semantic features inherent in the data being “mined”. The semantics are either injected i...
Rayid Ghani, Andrew E. Fano
ICSM
2002
IEEE
14 years 2 months ago
The Information Gathering Strategies of Software Maintainers
In examining software maintenance processes for improvement opportunities, an obvious choice is information flow. Obtaining accurate, up-to-date, and useful information about a sy...
Carolyn B. Seaman
ISMAR
2002
IEEE
14 years 2 months ago
Fata Morgana - A Presentation System for Product Design
Mobile Augmented Reality applications promise substantial savings in time and costs for product designers, in particular, for large products requiring scale models and expensive c...
Gudrun Klinker, Allen H. Dutoit, Martin Bauer, Joh...
CIVR
2010
Springer
176views Image Analysis» more  CIVR 2010»
14 years 2 months ago
The effect of baroque music on the PassPoints graphical password
Graphical passwords have been demonstrated to be the possible alternatives to traditional alphanumeric passwords. However, they still tend to follow predictable patterns that are ...
Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang ...
HAIS
2010
Springer
14 years 1 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
« Prev « First page 1167 / 1283 Last » Next »