Sciweavers

383 search results - page 16 / 77
» The Study of 3D-from-2D Using Elimination
Sort
View
ESWA
2008
231views more  ESWA 2008»
13 years 11 months ago
Automatic generation of concept hierarchies using WordNet
This paper examines and proposes the automatic generation of concept hierarchies using WordNet. Existing researches have mostly explored the utilization of concept hierarchies, bu...
Sangno Lee, Soon-Young Huh, Ronald D. McNiel
TSP
2010
13 years 5 months ago
Algorithms for Complex ML ICA and Their Stability Analysis Using Wirtinger Calculus
Abstract--We derive a class of algorithms for independent component analysis (ICA) based on maximum likelihood (ML) estimation and perform stability analysis of natural gradient ML...
Hualiang Li, Tülay Adali
ICS
2009
Tsinghua U.
14 years 5 months ago
Cancellation of loads that return zero using zero-value caches
The speed gap between processor and memory continues to limit performance. To address this problem, we explore the potential of eliminating Zero Loads—loads accessing memory loc...
Md. Mafijul Islam, Sally A. McKee, Per Stenstr&oum...
IWPSE
2007
IEEE
14 years 5 months ago
Using concept analysis to detect co-change patterns
Software systems need to change over time to cope with new requirements, and due to design decisions, the changes happen to crosscut the system’s structure. Understanding how ch...
Tudor Gîrba, Stéphane Ducasse, Adrian...
EDO
2005
Springer
14 years 4 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...