Sciweavers

140 search results - page 13 / 28
» Identifying web usability problems from eye-tracking data
Sort
View
USS
2010
13 years 5 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
CVPR
2009
IEEE
15 years 2 months ago
Learning from Ambiguously Labeled Images
In many image and video collections, we have access only to partially labeled data. For example, personal photo collections often contain several faces per image and a caption t...
Benjamin Sapp, Benjamin Taskar, Chris Jordan, Timo...
MSR
2009
ACM
14 years 9 days ago
On mining data across software repositories
Software repositories provide abundance of valuable information about open source projects. With the increase in the size of the data maintained by the repositories, automated ext...
Prasanth Anbalagan, Mladen A. Vouk
WWW
2010
ACM
14 years 29 days ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas
GISCIENCE
2008
Springer
154views GIS» more  GISCIENCE 2008»
13 years 8 months ago
Ontology-Based Geospatial Data Query and Integration
Geospatial data sharing is an increasingly important subject as large amount of data is produced by variety of sources, stored in incompatible formats, and accessible through diffe...
Tian Zhao, Chuanrong Zhang, Mingzhen Wei, Zhong-Re...