Sciweavers

274 search results - page 31 / 55
» Improving vulnerability discovery models
Sort
View
CVPR
2005
IEEE
14 years 9 months ago
3D Geometric and Optical Modeling of Warped Document Images from Scanners
When one scans a document page from a thick bound volume, the curvature of the page to be scanned results in two kinds of distortion in the scanned document images: i) shade along...
Li Zhang, Zheng Zhang 0003, Chew Lim Tan, Tao Xia
CCGRID
2001
IEEE
13 years 11 months ago
Performance Evaluation of an Agent-Based Resource Management Infrastructure for Grid Computing
Resource management is an important infrastructure in the grid computing environment. Scalability and adaptability are two key challenges in the implementation of such complex sof...
Junwei Cao, Darren J. Kerbyson, Graham R. Nudd
ICML
2006
IEEE
14 years 8 months ago
Pachinko allocation: DAG-structured mixture models of topic correlations
Latent Dirichlet allocation (LDA) and other related topic models are increasingly popular tools for summarization and manifold discovery in discrete data. However, LDA does not ca...
Wei Li, Andrew McCallum
ISBI
2006
IEEE
14 years 8 months ago
Automated tracking and modeling of microtubule dynamics
The method of microtubule tracking and dynamics analysis, presented here, improves upon the current means of manual and automated quantification of microtubule behavior. Key contr...
Motaz A. El Saban, Alphan Altinok, Austin J. Peck,...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 2 days ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider