Sciweavers

3013 search results - page 476 / 603
» Context-Oriented Domain Analysis
Sort
View
109
Voted
EDBTW
2010
Springer
15 years 7 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
105
Voted
AINA
2009
IEEE
15 years 7 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
123
Voted
CVPR
2009
IEEE
15 years 7 months ago
Learning multi-modal densities on Discriminative Temporal Interaction Manifold for group activity recognition
While video-based activity analysis and recognition has received much attention, existing body of work mostly deals with single object/person case. Coordinated multi-object activi...
Ruonan Li, Rama Chellappa, Shaohua Kevin Zhou
123
Voted
WSDM
2009
ACM
188views Data Mining» more  WSDM 2009»
15 years 7 months ago
Is Wikipedia link structure different?
In this paper, we investigate the difference between Wikipedia and Web link structure with respect to their value as indicators of the relevance of a page for a given topic of re...
Jaap Kamps, Marijn Koolen
EDBT
2009
ACM
123views Database» more  EDBT 2009»
15 years 7 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...