Sciweavers

948 search results - page 172 / 190
» Analysis of SITA policies
Sort
View
ICDAR
2007
IEEE
15 years 1 months ago
Iterated Document Content Classification
We report an improved methodology for training classifiers for document image content extraction, that is, the location and segmentation of regions containing handwriting, machine...
Chang An, Henry S. Baird, Pingping Xiu
DGO
2006
136views Education» more  DGO 2006»
14 years 11 months ago
Automated classification of congressional legislation
For social science researchers, content analysis and classification of United States Congressional legislative activities has been time consuming and costly. The Library of Congre...
Stephen Purpura, Dustin Hillard
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
BMCBI
2006
180views more  BMCBI 2006»
14 years 9 months ago
The Gaggle: An open-source software system for integrating bioinformatics software and data sources
Background: Systems biologists work with many kinds of data, from many different sources, using a variety of software tools. Each of these tools typically excels at one type of an...
Paul T. Shannon, David J. Reiss, Richard Bonneau, ...
ENTCS
2007
168views more  ENTCS 2007»
14 years 9 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...