Sciweavers

611 search results - page 122 / 123
» FPGA: what's in it for a database
Sort
View
IEEECIT
2010
IEEE
13 years 3 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
BIRTHDAY
2009
Springer
13 years 3 months ago
Some Notes on Models and Modelling
Analytical models are a fundamental tool in the development of computer-based systems of every kind: their essential purpose is to support human understanding and reasoning in deve...
Michael Jackson
ICWSM
2009
13 years 3 months ago
MakeMyPage: Social Media Meets Automatic Content Generation
Finding out about a topic online can be time consuming. It involves visiting multiple news sites, encyclopedia entries, video repositories and other resources while discarding irr...
Francisco Iacobelli, Kristian J. Hammond, Larry Bi...
BMCBI
2011
13 years 10 days ago
A discriminative method for family-based protein remote homology detection that combines inductive logic programming and proposi
Background: Remote homology detection is a hard computational problem. Most approaches have trained computational models by using either full protein sequences or multiple sequenc...
Juliana S. Bernardes, Alessandra Carbone, Gerson Z...
TIP
2011
217views more  TIP 2011»
13 years 8 days ago
Contextual Object Localization With Multiple Kernel Nearest Neighbor
—Recently, many object localization models have shown that incorporating contextual cues can greatly improve accuracy over using appearance features alone. Therefore, many of the...
Brian McFee, Carolina Galleguillos, Gert R. G. Lan...