Sciweavers

274 search results - page 47 / 55
» Improving vulnerability discovery models
Sort
View
GEOINFO
2003
13 years 9 months ago
The Architecture of a Mobile Emergency Plan Deployment System
This paper describes the implementation of a workflow management system to support mobile GIS workgroup applications and highlights the design of the workflow definition language t...
Fábio Meira de Oliveira Dias, Marcelo T&iac...
ICCV
2009
IEEE
15 years 19 days ago
Evaluating Information Contributions of Bottom-up and Top-down Processes
This paper presents a method to quantitatively evaluate information contributions of individual bottom-up and topdown computing processes in object recognition. Our objective is...
Xiong Yang, Tianfu Wu, Song-Chun Zhu
CEC
2007
IEEE
14 years 2 months ago
Graph design by graph grammar evolution
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...
Martin H. Luerssen, David M. W. Powers
IAT
2006
IEEE
14 years 1 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
SIGECOM
2006
ACM
143views ECommerce» more  SIGECOM 2006»
14 years 1 months ago
Braess's paradox in large random graphs
Braess’s Paradox is the counterintuitive but well-known fact that removing edges from a network with “selfish routing” can decrease the latency incurred by traffic in an eq...
Gregory Valiant, Tim Roughgarden