Sciweavers

59 search results - page 11 / 12
» Improvement on Intrusion Detection Technology Based on Proto...
Sort
View
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 5 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
IBPRIA
2007
Springer
13 years 11 months ago
On the Detection of Regions-of-Interest in Dynamic Contrast-Enhanced MRI
Multivariate imaging technologies such as Dynamic Contrast-Enhanced Magnetic Resonance Imaging (DCE-MRI) have recently gained an important attention as it improves tumour detection...
David Raba, Marta Peracaula, Robert Marti, Joan Ma...
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
13 years 11 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
SIGMOD
2009
ACM
269views Database» more  SIGMOD 2009»
14 years 5 months ago
Efficient approximate entity extraction with edit distance constraints
Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respe...
Wei Wang 0011, Chuan Xiao, Xuemin Lin, Chengqi Zha...
ICMI
2007
Springer
100views Biometrics» more  ICMI 2007»
13 years 11 months ago
Presentation sensei: a presentation training system using speech and image processing
In this paper we present a presentation training system that observes a presentation rehearsal and provides the speaker with recommendations for improving the delivery of the pres...
Kazutaka Kurihara, Masataka Goto, Jun Ogata, Yosuk...