Sciweavers

7318 search results - page 6 / 1464
» Models of real-valued measurability
Sort
View
CSREASAM
2009
13 years 8 months ago
A Stochastic Model of the Damage Propagation in Database Systems
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Hai Wang, Su Yan
ICSE
2010
IEEE-ACM
14 years 4 days ago
A degree-of-knowledge model to capture source code familiarity
The size and high rate of change of source code comprising a software system make it difficult for software developers to keep up with who on the team knows about particular parts...
Thomas Fritz, Jingwen Ou, Gail C. Murphy, Emerson ...
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
14 years 1 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
GBRPR
2007
Springer
13 years 11 months ago
Image Classification Using Marginalized Kernels for Graphs
We propose in this article an image classification technique based on kernel methods and graphs. Our work explores the possibility of applying marginalized kernels to image process...
Emanuel Aldea, Jamal Atif, Isabelle Bloch
SIGIR
2012
ACM
11 years 9 months ago
Time-based calibration of effectiveness measures
Many current effectiveness measures incorporate simplifying assumptions about user behavior. These assumptions prevent the measures from reflecting aspects of the search process...
Mark D. Smucker, Charles L. A. Clarke