Sciweavers

5864 search results - page 136 / 1173
» Can We Work around Numerical Methods
Sort
View
NDSS
2009
IEEE
15 years 11 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...
CADUI
2004
15 years 5 months ago
The Ubiquitous Interactor - Device Independent Access to Mobile Services
: The Ubiquitous Interactor (UBI) addresses the problems of design and development arising around services that need to be accessed from many different devices. In UBI, the same se...
Stina Nylander, Markus Bylund, Annika Wærn
VCIP
2003
146views Communications» more  VCIP 2003»
15 years 5 months ago
Real-time free-viewpoint video rendering from volumetric geometry
The aim of this work is to render high-quality views of a dynamic scene from novel viewpoints in real-time. An online system available at our institute computes the visual hull as...
Bastian Goldlücke, Marcus A. Magnor
LREC
2008
158views Education» more  LREC 2008»
15 years 5 months ago
Semi-automatic Building Method for a Multidimensional Affect Dictionary for a New Language
Detecting the tone or emotive content of a text message is increasingly important in many natural language processing applications. Examples of such applications are rating new bo...
Guillaume Pitel, Gregory Grefenstette
CIKM
2006
Springer
15 years 8 months ago
Knowing a web page by the company it keeps
Web page classification is important to many tasks in information retrieval and web mining. However, applying traditional textual classifiers on web data often produces unsatisfyi...
Xiaoguang Qi, Brian D. Davison