Sciweavers

5544 search results - page 213 / 1109
» Three Inadequate Models
Sort
View
ICMCS
2005
IEEE
98views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Auto cropping for digital photographs
In this paper, we propose an effective approach to the nearly untouched problem, still photograph auto cropping, which is one of the important features to automatically enhance ph...
Mingju Zhang, Lei Zhang, Yanfeng Sun, Lin Feng, We...
INAP
2001
Springer
14 years 1 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
ISSRE
2007
IEEE
13 years 11 months ago
Fault Prediction using Early Lifecycle Data
The prediction of fault-prone modules in a software project has been the topic of many studies. In this paper, we investigate whether metrics available early in the development li...
Yue Jiang, Bojan Cukic, Tim Menzies
ACL
2011
13 years 29 days ago
Automatically Evaluating Text Coherence Using Discourse Relations
We present a novel model to represent and assess the discourse coherence of text. Our model assumes that coherent text implicitly favors certain types of discourse relation transi...
Ziheng Lin, Hwee Tou Ng, Min-Yen Kan
ICDM
2008
IEEE
148views Data Mining» more  ICDM 2008»
14 years 3 months ago
Formal Models for Expert Finding on DBLP Bibliography Data
Finding relevant experts in a specific field is often crucial for consulting, both in industry and in academia. The aim of this paper is to address the expert-finding task in a...
Hongbo Deng, Irwin King, Michael R. Lyu