Sciweavers

1479 search results - page 237 / 296
» Management without (Detailed) Models
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 10 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
TCSV
2008
277views more  TCSV 2008»
13 years 10 months ago
Automatic Single View-Based 3-D Face Synthesis for Unsupervised Multimedia Applications
Abstract--Various 3-D face synthesis techniques have been proposed and extensively used in many applications. Compared with others, single view-based face synthesis technology allo...
Yun Sheng, Abdul H. Sadka, Ahmet M. Kondoz
ICWSM
2009
13 years 7 months ago
From Generating to Mining: Automatically Scripting Conversations Using Existing Online Sources
Hearing people argue opposing sides of an issue can be a useful way to understand the topic; however, these debates or conversations often don't exist. Unfortunately, generat...
Nathan D. Nichols, Lisa M. Gandy, Kristian J. Hamm...
IUI
2011
ACM
13 years 29 days ago
ChemInk: a natural real-time recognition system for chemical drawings
We describe a new sketch recognition framework for chemical structure drawings that combines multiple levels of visual features using a jointly trained conditional random field. ...
Tom Y. Ouyang, Randall Davis
IMC
2009
ACM
14 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...