Sciweavers

8479 search results - page 1267 / 1696
» Data Extraction from Web Data Sources
Sort
View
167
Voted
DIM
2009
ACM
15 years 9 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
MICCAI
1999
Springer
15 years 9 months ago
A Robust 3-D Reconstruction System for Human Jaw Modeling
Abstract. This paper presents a model-based vision system for dentistry that will assist in diagnosis, treatment planning and surgical simulation. Dentistry requires the accurate 3...
Sameh M. Yamany, Aly A. Farag, David Tasman, Allan...
LREC
2008
57views Education» more  LREC 2008»
15 years 6 months ago
A Development Environment for Configurable Meta-Annotators in a Pipelined NLP Architecture
Information extraction from large data repositories is critical to Information Management solutions. In addition to prerequisite corpus analysis, to determine domain-specific char...
Youssef Drissi, Branimir Boguraev, David Ferrucci,...
IJCAI
2007
15 years 6 months ago
ItemRank: A Random-Walk Based Scoring Algorithm for Recommender Engines
Recommender systems are an emerging technology that helps consumers to find interesting products. A recommender system makes personalized product suggestions by extracting knowle...
Marco Gori, Augusto Pucci
140
Voted
IPCV
2007
15 years 6 months ago
Use of Paraplanar Constraint for Parallel Inspection of Wafer Bump Heights
- The shrunk dimension of electronic devices leads to more stringent requirement on process control and quality assurance of their fabrication. For instance, direct die-to-die bond...
Mei Dong, Ronald Chung, Edmund Y. Lam, Kenneth S. ...
« Prev « First page 1267 / 1696 Last » Next »