Sciweavers

1407 search results - page 172 / 282
» Join-Graph Propagation Algorithms
Sort
View
ICSE
2009
IEEE-ACM
14 years 10 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
ECIR
2009
Springer
14 years 6 months ago
Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation
Algorithms that enable the process of automatically mining distinct topics in document collections have become increasingly important due to their applications in many fields and ...
Levent Bolelli, Seyda Ertekin, C. Lee Giles
CIDM
2009
IEEE
14 years 3 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
CPAIOR
2009
Springer
14 years 3 months ago
Reformulating Global Grammar Constraints
An attractive mechanism to specify global constraints in rostering and other domains is via formal languages. For instance, the REGULAR and GRAMMAR constraints specify constraints ...
George Katsirelos, Nina Narodytska, Toby Walsh
ISVC
2009
Springer
14 years 3 months ago
Optical Flow Computation from an Asynchronised Multiresolution Image Sequence
We develop a method for the optical flow computation from a zooming image sequence. The synchronisation of image resolution for a pair of successive images in an image sequence is...
Yusuke Kameda, Naoya Ohnishi, Atsushi Imiya, Tomoy...