Sciweavers

1310 search results - page 210 / 262
» On a Class of Traceability Codes
Sort
View
IBPRIA
2007
Springer
14 years 1 months ago
Handwritten Symbol Recognition by a Boosted Blurred Shape Model with Error Correction
One of the major difficulties of handwriting recognition is the variability among symbols because of the different writer styles. In this paper we introduce the boosting of blurre...
Alicia Fornés, Sergio Escalera, Josep Llad&...
MLDM
2007
Springer
14 years 1 months ago
Ensemble-based Feature Selection Criteria
Recursive Feature Elimination (RFE) combined with feature ranking is an effective technique for eliminating irrelevant features when the feature dimension is large, but it is diffi...
Terry Windeatt, Matthew Prior, Niv Effron, Nathan ...
MODELS
2007
Springer
14 years 1 months ago
Magritte - A Meta-driven Approach to Empower Developers and End Users
Model-driven engineering is a powerful approach to build large-scale applications. However, an application’s metamodel often remains static after the initial development phase an...
Lukas Renggli, Stéphane Ducasse, Adrian Kuh...
AGILEDC
2006
IEEE
14 years 1 months ago
Embedded Agile Project by the Numbers With Newbies
There is a class of projects that can only be accomplished via agile practices due to their complexity and risks. It is rare for such a project to be staffed with newbies but it h...
Nancy Van Schooenderwoert
DASC
2006
IEEE
14 years 1 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...