Sciweavers

19 search results - page 3 / 4
» Representation Transfer via Elaboration
Sort
View
SIGSOFT
2003
ACM
14 years 11 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
WWW
2010
ACM
13 years 11 months ago
Cross-domain sentiment classification via spectral feature alignment
Sentiment classification aims to automatically predict sentiment polarity (e.g., positive or negative) of users publishing sentiment data (e.g., reviews, blogs). Although traditio...
Sinno Jialin Pan, Xiaochuan Ni, Jian-Tao Sun, Qian...
BILDMED
2007
135views Algorithms» more  BILDMED 2007»
14 years 9 days ago
A New Class of Distance Measures for Registration of Tubular Models to Image Data
In some registration applications additional user knowledge is available, which can improve and accelerate the registration process, especially for non-rigid registration. This is ...
Thomas Lange, Hans Lamecker, Michael Hünerbei...
INFOCOM
2010
IEEE
13 years 8 months ago
Efficient Similarity Estimation for Systems Exploiting Data Redundancy
Many modern systems exploit data redundancy to improve efficiency. These systems split data into chunks, generate identifiers for each of them, and compare the identifiers among ot...
Kanat Tangwongsan, Himabindu Pucha, David G. Ander...
SAC
2010
ACM
14 years 5 months ago
Web-based graphical querying of databases through an ontology: the Wonder system
Biological scientists have made large amounts of data available on the Web, which can be accessed by canned or precomputed queries presented via web forms. To satisfy further info...
Diego Calvanese, C. Maria Keet, Werner Nutt, Maria...