Sciweavers

2613 search results - page 473 / 523
» Proposal for Tools Supporting Component Based Programming
Sort
View
143
Voted
TIFS
2008
129views more  TIFS 2008»
15 years 2 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
122
Voted
ANLP
1992
68views more  ANLP 1992»
15 years 3 months ago
Evaluating Parsing Strategies Using Standardized Parse Files
The availability of large files of manuallyreviewed parse trees from the University of Pennsylvania "tree bank", along with a program for comparing system-generated pars...
Ralph Grishman, Catherine Macleod, John Sterling
AOSD
2003
ACM
15 years 7 months ago
Modularisation and composition of aspectual requirements
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Awais Rashid, Ana M. D. Moreira, João Ara&u...
137
Voted
JMLR
2010
206views more  JMLR 2010»
14 years 9 months ago
Learning Translation Invariant Kernels for Classification
Appropriate selection of the kernel function, which implicitly defines the feature space of an algorithm, has a crucial role in the success of kernel methods. In this paper, we co...
Sayed Kamaledin Ghiasi Shirazi, Reza Safabakhsh, M...
136
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda