Sciweavers

12193 search results - page 4 / 2439
» It's not all about
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 10 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
NECO
2011
13 years 1 months ago
Collective Stability of Networks of Winner-Take-All Circuits
The neocortex has a remarkably uniform neuronal organization, suggesting that common principles of processing are employed throughout its extent. In particular, the patterns of co...
Ueli Rutishauser, Rodney J. Douglas, Jean-Jacques ...
CIKM
2011
Springer
12 years 6 months ago
Do all birds tweet the same?: characterizing twitter around the world
Social media services have spread throughout the world in just a few years. They have become not only a new source of information, but also new mechanisms for societies world-wide...
Barbara Poblete, Ruth Garcia, Marcelo Mendoza, Ale...
CSDA
2007
92views more  CSDA 2007»
13 years 6 months ago
The Bayes factor for inequality and about equality constrained models
The Bayes factor is a useful tool for evaluating sets of inequality and about equality constrained models. In the approach described, the Bayes factor for a constrained model with...
Irene Klugkist, Herbert Hoijtink
IJCAI
2003
13 years 8 months ago
Getting Serious about the Development of Computational Humor
Society needs humor, not just for entertainment. In the Web age, presentations become more and more flexible and personalized and they will require hu­ mor contributions for elec...
Oliviero Stock, Carlo Strapparava