Sciweavers

5122 search results - page 905 / 1025
» Comparing Consequence Relations
Sort
View
SIGIR
2009
ACM
15 years 10 months ago
An aspectual interface for supporting complex search tasks
With the increasing importance of search systems on the web, there is a continuing push to design interfaces which are a better match with the kinds of real-world tasks in which u...
Robert Villa, Iván Cantador, Hideo Joho, Jo...
SIGIR
2009
ACM
15 years 10 months ago
Learning to rank for quantity consensus queries
Web search is increasingly exploiting named entities like persons, places, businesses, addresses and dates. Entity ranking is also of current interest at INEX and TREC. Numerical ...
Somnath Banerjee, Soumen Chakrabarti, Ganesh Ramak...
SOUPS
2009
ACM
15 years 10 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
BIBE
2008
IEEE
203views Bioinformatics» more  BIBE 2008»
15 years 10 months ago
A study of the parameters affecting minimum detectable activity concentration level of clinical LSO PET scanners
— Recent studies in the field of molecular imaging have demonstrated the need for PET probes capable of imaging very weak activity distributions. Over this range of applications ...
Nicolas A. Karakatsanis, Konstantina S. Nikita