Sciweavers

264 search results - page 29 / 53
» New Issues in Near-duplicate Detection
Sort
View
IJIPT
2007
91views more  IJIPT 2007»
13 years 7 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins
SIGSOFT
2007
ACM
14 years 8 months ago
Towards incremental adaptive covering arrays
The increasing complexity of configurable software systems creates a need for more intelligent sampling mechanisms to detect and locate failure-inducing dependencies between confi...
Adam A. Porter, Myra B. Cohen, Sandro Fouché...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Mining exception-handling rules as sequence association rules
Programming languages such as Java and C++ provide exception-handling constructs to handle exception conditions. Applications are expected to handle these exception conditions and...
Suresh Thummalapenta, Tao Xie
DASC
2006
IEEE
14 years 1 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
ICPR
2002
IEEE
14 years 18 days ago
Near-Optimal Regularization Parameters for Applications in Computer Vision
Computer vision requires the solution of many ill-posed problems such as optical flow, structure from motion, shape from shading, surface reconstruction, image restoration and ed...
Changjiang Yang, Ramani Duraiswami, Larry S. Davis