Sciweavers

1596 search results - page 297 / 320
» An Information Structural Approach to Spoken Language Genera...
Sort
View
WWW
2010
ACM
15 years 9 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
ECBS
1999
IEEE
171views Hardware» more  ECBS 1999»
15 years 6 months ago
Metamodeling - Rapid Design and Evolution of Domain-Specific Modeling Environments
Model integrated computing (MIC) is gaining increased attention as an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific softwar...
Greg Nordstrom, Janos Sztipanovits, Gabor Karsai, ...
CVPR
2001
IEEE
16 years 3 months ago
Clustering Art
We extend a recently developed method [1] for learning the semantics of image databases using text and pictures. We incorporate statistical natural language processing in order to...
Kobus Barnard, Pinar Duygulu, David A. Forsyth
CLEF
2005
Springer
15 years 7 months ago
CLEF 2005: Multilingual Retrieval by Combining Multiple Multilingual Ranked Lists
: We participated in two tasks: Multi-8 two-years-on retrieval and Multi-8 results merging. For our multi-8 two-years-on retrieval work, simple multilingual ranked lists are first ...
Luo Si, Jamie Callan
CVPR
2003
IEEE
16 years 3 months ago
Object Removal by Exemplar-Based Inpainting
A new algorithm is proposed for removing large objects from digital images. The challenge is to fill in the hole that is left behind in a visually plausible way. In the past, this...
Antonio Criminisi, Kentaro Toyama, Patrick P&eacut...