Sciweavers

1497 search results - page 291 / 300
» Online Negative Databases
Sort
View
SIGUCCS
2000
ACM
14 years 2 days ago
Linux and Open Source in the Academic Enterprise
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...
CIKM
1999
Springer
13 years 12 months ago
Requirement-Based Data Cube Schema Design
On-line analytical processing (OLAP) requires e cient processing of complex decision support queries over very large databases. It is well accepted that pre-computed data cubes ca...
David Wai-Lok Cheung, Bo Zhou, Ben Kao, Hongjun Lu...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ICIAP
1997
ACM
13 years 12 months ago
Color Based Object Recognition
The purpose is to arrive at recognition of multicolored objects invariant to a substantial change in viewpoint, object geometry and illumination. Assuming dichromatic reflectance...
Theo Gevers, Arnold W. M. Smeulders
ACMICEC
2007
ACM
168views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Designing novel review ranking systems: predicting the usefulness and impact of reviews
With the rapid growth of the Internet, users' ability to publish content has created active electronic communities that provide a wealth of product information. Consumers nat...
Anindya Ghose, Panagiotis G. Ipeirotis