Sciweavers

495 search results - page 27 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
CVPR
2011
IEEE
13 years 3 months ago
Learning the Easy Things First: Self-Paced Visual Category Discovery
Objects vary in their visual complexity, yet existing discovery methods perform “batch” clustering, paying equal attention to all instances simultaneously—regardless of the ...
Yong Jae Lee, Kristen Grauman
JWSR
2007
106views more  JWSR 2007»
13 years 7 months ago
Architecture-Driven Service Discovery for Service Centric Systems
: Service discovery has been recognised as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such syst...
Alexander Kozlenkov, George Spanoudakis, Andrea Zi...
ISBI
2008
IEEE
14 years 8 months ago
Statistical colocalization in biological imaging with false discovery control
In this paper, we present a novel object-based statistical colocalization method. Our colocalization relies on multiple hypothesis tests on the distances between all pairs of the ...
Bo Zhang, Nicolas Chenouard, Jean-Christophe Olivo...
ISSA
2004
13 years 9 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
AAAI
1998
13 years 9 months ago
Discovering Admissible Simultaneous Equations of Large Scale Systems
SSFisasystemtodiscoverthestructureofsimultaneous equations governing an objective process through experiments. SSF combined with another system SDS to discover a quantitative form...
Takashi Washio, Hiroshi Motoda