Sciweavers

1940 search results - page 286 / 388
» Optimizing search engines using clickthrough data
Sort
View
MSR
2005
ACM
14 years 3 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
WETICE
2002
IEEE
14 years 3 months ago
Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working
The MObile Teamwork Infrastructure for Organizations Networking (MOTION) 1 service platform that we have designed and implemented addresses an emerging requirement in the daily bu...
Pascal Fenkam, Engin Kirda, Schahram Dustdar, Hara...
SIGIR
2010
ACM
14 years 2 months ago
Short text classification in twitter to improve information filtering
In microblogging services such as Twitter, the users may become overwhelmed by the raw data. One solution to this problem is the classification of short text messages. As short te...
Bharath Sriram, Dave Fuhry, Engin Demir, Hakan Fer...
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 8 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
JMIV
2006
176views more  JMIV 2006»
13 years 10 months ago
Segmentation of Vectorial Image Features Using Shape Gradients and Information Measures
In this paper, we propose to focus on the segmentation of vectorial features (e.g. vector fields or color intensity) using region-based active contours. We search for a domain that...
Ariane Herbulot, Stéphanie Jehan-Besson, St...