Sciweavers

2570 search results - page 413 / 514
» Constructing a web information system development methodolog...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
MM
2009
ACM
196views Multimedia» more  MM 2009»
15 years 4 months ago
Mirror world navigation for mobile users based on augmented reality
Finding a destination in unfamiliar environments of complex office building or shopping mall has been always bothering us in daily life. Fine-scale directional guidance, a combina...
Patricia P. Wang, Tao Wang, Dayong Ding, Yimin Zha...
LREC
2010
179views Education» more  LREC 2010»
14 years 11 months ago
Evaluation Protocol and Tools for Question-Answering on Speech Transcripts
Question Answering (QA) technology aims at providing relevant answers to natural language questions. Most Question Answering research has focused on mining document collections co...
Nicolas Moreau, Olivier Hamon, Djamel Mostefa, Sop...
EDOC
2009
IEEE
15 years 4 months ago
Using Enterprise Architecture Management Patterns to Complement TOGAF
—The design of an Enterprise Architecture (EA) management function for an enterprise is no easy task. Various frameworks exist as well as EA management tools, which promise to de...
Sabine Buckl, Alexander M. Ernst, Florian Matthes,...
VISUALIZATION
2005
IEEE
15 years 3 months ago
Example-based Volume Illustrations
Scientific illustrations use accepted conventions and methodologies to effectively convey object properties and improve our understanding. We present a method to illustrate volum...
Aidong Lu, David S. Ebert