Sciweavers

2826 search results - page 465 / 566
» A resource-based analysis of IT sourcing
Sort
View
CIKM
2008
Springer
15 years 3 months ago
Automatic detection of treatment relationships for patent retrieval
We devise a method for automatically detecting treatment relationships using lexico-syntactic patterns and its application to medical-oriented patent retrieval. This process for d...
Aaron Chu, Shigeyuki Sakurai, Alfonso F. Cardenas
CLEF
2008
Springer
15 years 3 months ago
Overview of the WikipediaMM Task at ImageCLEF 2008
The wikipediaMM task provides a testbed for the system-oriented evaluation of ad-hoc retrieval from a collection of Wikipedia images. It became a part of the ImageCLEF evaluation ...
Theodora Tsikrika, Jana Kludas
CVPR
2008
IEEE
15 years 3 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
DCOSS
2008
Springer
15 years 3 months ago
LiveNet: Using Passive Monitoring to Reconstruct Sensor Network Dynamics
We describe LiveNet, a set of tools and analysis methods for reconstructing the complex behavior of a deployed sensor network. LiveNet is based on the use of multiple passive packe...
Bor-rong Chen, Geoffrey Peterson, Geoffrey Mainlan...
DSN
2008
IEEE
15 years 3 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu