Sciweavers

2715 search results - page 540 / 543
» Database Publication Practices
Sort
View
IEEECIT
2010
IEEE
14 years 10 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
97
Voted
ISSRE
2010
IEEE
14 years 10 months ago
Automating System Tests Using Declarative Virtual Machines
—Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system’s source code...
Sander van der Burg, Eelco Dolstra
JIDM
2010
155views more  JIDM 2010»
14 years 10 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...
PR
2010
126views more  PR 2010»
14 years 10 months ago
Discriminability and reliability indexes: Two new measures to enhance multi-image face recognition
In order to handle complex face image variations in face recognition, multi-image face recognition has been proposed, instead of using a single still-imagebased approach. In many ...
Weiwen Zou, Pong C. Yuen
PKDD
2010
Springer
235views Data Mining» more  PKDD 2010»
14 years 9 months ago
Online Structural Graph Clustering Using Frequent Subgraph Mining
The goal of graph clustering is to partition objects in a graph database into different clusters based on various criteria such as vertex connectivity, neighborhood similarity or t...
Madeleine Seeland, Tobias Girschick, Fabian Buchwa...