Sciweavers

1128 search results - page 115 / 226
» Structuring anonymity metrics
Sort
View
ICST
2010
IEEE
13 years 8 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
TASLP
2011
13 years 5 months ago
On the Information Geometry of Audio Streams With Applications to Similarity Computing
Abstract—This paper proposes methods for information processing of audio streams using methods of information geometry. We lay the theoretical groundwork for a framework allowing...
Arshia Cont, Shlomo Dubnov, Gérard Assayag
CVPR
2012
IEEE
12 years 17 days ago
Real-time 6D stereo Visual Odometry with non-overlapping fields of view
In this paper, we present a framework for 6D absolute scale motion and structure estimation of a multi-camera system in challenging indoor environments. It operates in real-time a...
Tim Kazik, Laurent Kneip, Janosch Nikolic, Marc Po...
ICML
2005
IEEE
14 years 11 months ago
Large margin non-linear embedding
It is common in classification methods to first place data in a vector space and then learn decision boundaries. We propose reversing that process: for fixed decision boundaries, ...
Alexander Zien, Joaquin Quiñonero Candela
WCRE
2009
IEEE
14 years 4 months ago
Supporting Feature-Level Software Maintenance
The proposed research defines data fusion approaches to support software maintenance tasks at the feature level. Static, dynamic, and textual sources of information are combined t...
Meghan Revelle