Sciweavers

11573 search results - page 2015 / 2315
» Designing Relational Databases
Sort
View
CHI
2007
ACM
15 years 8 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
CIDM
2007
IEEE
15 years 8 months ago
Identifying Anatomical Phrases in Clinical Reports by Shallow Semantic Parsing Methods
Natural Language Processing (NLP) is being applied for several information extraction tasks in the biomedical domain. The unique nature of clinical information requires the need fo...
Vijayaraghavan Bashyam, Ricky K. Taira

Publication
179views
15 years 8 months ago
AutoSelect: What You Want Is What You Get Real-Time Processing of Visual Attention and Affect
While objects of our focus of attention (“where we are looking at”) and accompanying affective responses to those objects is part of our daily experience, little research exis...
Nikolaus Bee, Helmut Prendinger, Arturo Nakasone, ...
DOCENG
2007
ACM
15 years 8 months ago
Mapping paradigm for document transformation
Since the advent of XML, the ability to transform documents using transformation languages such as XSLT has become an important challenge. However, writing a transformation script...
Arnaud Blouin, Olivier Beaudoux
ECCV
2010
Springer
15 years 8 months ago
Bundle Adjustment in the Large
Abstract. We present the design and implementation of a new inexact Newton type algorithm for solving large-scale bundle adjustment problems with tens of thousands of images. We ex...
« Prev « First page 2015 / 2315 Last » Next »