Sciweavers

6167 search results - page 983 / 1234
» Can Refinement be Automated
Sort
View
88
Voted
IUI
2006
ACM
15 years 6 months ago
Enabling context-sensitive information seeking
1 Information seeking is an important but often difficult task especially when involving large and complex data sets. We hypothesize that a context-sensitive interaction paradigm c...
Michelle X. Zhou, Keith Houck, Shimei Pan, James S...
104
Voted
JCDL
2006
ACM
140views Education» more  JCDL 2006»
15 years 6 months ago
Exploring erotics in Emily Dickinson's correspondence with text mining and visual interfaces
This paper describes a system to support humanities scholars in their interpretation of literary work. It presents a user interface and web architecture that integrates text minin...
Catherine Plaisant, James Rose, Bei Yu, Loretta Au...
98
Voted
JCDL
2006
ACM
167views Education» more  JCDL 2006»
15 years 6 months ago
Combining DOM tree and geometric layout analysis for online medical journal article segmentation
We describe an HTML web page segmentation algorithm, which is applied to segment online medical journal articles (regular HTML and PDF-Converted-HTML files). The web page content ...
Jie Zou, Daniel X. Le, George R. Thoma
109
Voted
CVPR
2010
IEEE
15 years 6 months ago
3D Morphable Model Construction for Robust Ear and Face Recognition
Recent work suggests that the human ear varies significantly between different subjects and can be used for identification. In principle, therefore, using ears in addition to the f...
John D. Bustard, Mark S. Nixon
ACSAC
2005
IEEE
15 years 6 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan