Sciweavers

1225 search results - page 157 / 245
» Maximal Consistent Subsets
Sort
View
INFSOF
2006
102views more  INFSOF 2006»
13 years 9 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
ENTCS
2007
128views more  ENTCS 2007»
13 years 9 months ago
Optimisation Validation
We introduce the idea of optimisation validation, which is to formally establish that an instance of an optimising transformation indeed improves with respect to some resource mea...
David Aspinall, Lennart Beringer, Alberto Momiglia...
PAMI
2008
152views more  PAMI 2008»
13 years 9 months ago
Class-Based Feature Matching Across Unrestricted Transformations
We develop a novel method for class-based feature matching across large changes in viewing conditions. The method (called MBE) is based on the property that when objects share a si...
Evgeniy Bart, Shimon Ullman
ISI
2007
Springer
13 years 9 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
IVS
2007
100views more  IVS 2007»
13 years 9 months ago
NetLens: iterative exploration of content-actor network data
Networks have remained a challenge for information retrieval and visualization because of the rich set of tasks that users want to accomplish. This paper n abstract Content-Actor ...
Hyunmo Kang, Catherine Plaisant, Bongshin Lee, Ben...