Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ACL
2009
10 years 20 days ago
A Novel Word Segmentation Approach for Written Languages with Word Boundary Markers
Most NLP applications work under the assumption that a user input is error-free; thus, word segmentation (WS) for written languages that use word boundary markers (WBMs), such as ...
Han-Cheol Cho, Do-Gil Lee, Jung-Tae Lee, Pontus St...
MICCAI
2010
Springer
10 years 22 days ago
Fast Random Walker with Priors Using Precomputation for Interactive Medical Image Segmentation
Abstract. Updating segmentation results in real-time based on repeated user input is a reliable way to guarantee accuracy, paramount in medical imaging applications, while making e...
Shawn Andrews, Ghassan Hamarneh, Ahmed Saad
TOG
2008
120views more  TOG 2008»
10 years 2 months ago
Shading-based surface editing
We present a system for free-form surface modeling that allows a user to modify a shape by changing its rendered, shaded image using stroke-based drawing tools. User input is tran...
Yotam I. Gingold, Denis Zorin
LREC
2010
140views Education» more  LREC 2010»
10 years 4 months ago
Wizard of Oz Experiments for a Companion Dialogue System: Eliciting Companionable Conversation
Within the EU-funded COMPANIONS project, we are working to evaluate new collaborative conversational models of dialogue. Such an evaluation requires us to benchmark approaches to ...
Nick Webb, David Benyon, Jay Bradley, Preben Hanse...
CCS
1999
ACM
10 years 7 months ago
Using Smartcards to Secure a Personalized Gambling Device
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
William Aiello, Aviel D. Rubin, Martin Strauss
EDO
2005
Springer
10 years 8 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
ACSAC
2005
IEEE
10 years 8 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz
COMPSAC
2007
IEEE
10 years 9 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
EICS
2009
ACM
10 years 9 months ago
Toward user interface virtualization: legacy applications and innovative interaction systems
Single-user, desktop-based computer applications are pervasive in our daily lives and work. The prospect of using these applications with innovative interaction systems, like mult...
Guillaume Besacier, Frédéric Vernier
ICCV
2003
IEEE
11 years 4 months ago
Recognising Panoramas
The problem considered in this paper is the fully automatic construction of panoramas. Fundamentally, this problem requires recognition, as we need to know which parts of the pano...
Matthew Brown, David G. Lowe
books