Sciweavers

14649 search results - page 2859 / 2930
» Principles of problem solving
Sort
View
EMMCVPR
2007
Springer
15 years 6 months ago
An Automatic Portrait System Based on And-Or Graph Representation
Abstract. In this paper, we present an automatic human portrait system based on the And-Or graph representation. The system can automatically generate a set of life-like portraits ...
Feng Min, Jin-Li Suo, Song Chun Zhu, Nong Sang
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 6 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ICLP
2010
Springer
15 years 6 months ago
Tight Semantics for Logic Programs
We define the Tight Semantics (TS), a new semantics for all NLPs complying with the requirements of: 2-valued semantics; preserving the models of SM; guarantee of model existence...
Luís Moniz Pereira, Alexandre Miguel Pinto
ISSTA
2010
ACM
15 years 6 months ago
Proving memory safety of floating-point computations by combining static and dynamic program analysis
Whitebox fuzzing is a novel form of security testing based on dynamic symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found many ne...
Patrice Godefroid, Johannes Kinder
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
15 years 6 months ago
Direct mining of discriminative patterns for classifying uncertain data
Classification is one of the most essential tasks in data mining. Unlike other methods, associative classification tries to find all the frequent patterns existing in the input...
Chuancong Gao, Jianyong Wang
« Prev « First page 2859 / 2930 Last » Next »