Sciweavers

984 search results - page 142 / 197
» Combining and selecting characteristics of information use
Sort
View
EKAW
2010
Springer
14 years 10 months ago
Mobile Cultural Heritage Guide: Location-Aware Semantic Search
In this paper we explore the use of location aware mobile devices for searching and browsing a large number of general and cultural heritage information repositories. Based on GPS ...
Chris J. van Aart, Bob J. Wielinga, Willem Robert ...
IPPS
1998
IEEE
15 years 4 months ago
Configuration Independent Analysis for Characterizing Shared-Memory Applications
Characterizing shared-memory applications provides insight to design efficient systems, and provides awareness to identify and correct application performance bottlenecks. Configu...
Gheith A. Abandah, Edward S. Davidson
TIP
2008
169views more  TIP 2008»
14 years 11 months ago
Weakly Supervised Learning of a Classifier for Unusual Event Detection
In this paper, we present an automatic classification framework combining appearance based features and Hidden Markov Models (HMM) to detect unusual events in image sequences. One...
Mark Jager, Christian Knoll, Fred A. Hamprecht
IMC
2009
ACM
15 years 6 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 8 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos