Sciweavers

291 search results - page 41 / 59
» Enforceable social laws
Sort
View
DSS
2007
111views more  DSS 2007»
14 years 9 months ago
Applying question answering technology to locating malevolent online content
We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
Dmitri Roussinov, Jose Antonio Robles-Flores
SOCO
2008
Springer
14 years 9 months ago
A face recognition system based on Pseudo 2D HMM applied to neural network coefficients
Face recognition from an image or video sequences is emerging as an active research area with numerous commercial and law enforcement applications. In this paper different Pseudo 2...
Vitoantonio Bevilacqua, Lucia Cariello, Gaetano Ca...
TOG
2008
108views more  TOG 2008»
14 years 9 months ago
A virtual restoration stage for real-world objects
In this paper, we introduce a system to virtually restore damaged or historically significant objects without needing to physically change the object in any way. Our work addresse...
Daniel G. Aliaga, Alvin J. Law, Yu Hong Yeung
IJDE
2002
159views more  IJDE 2002»
14 years 9 months ago
An Examination of Digital Forensic Models
Law enforcement is in a perpetual race with criminals in the application of digital technologies, and requires the development of tools to systematically search digital devices fo...
Mark Reith, Clint Carr, Gregg H. Gunsch
SAC
2002
ACM
14 years 9 months ago
Statistical properties of the simulated time horizon in conservative parallel discrete-event simulations
We investigate the universal characteristics of the simulated time horizon of the basic conservative parallel algorithm when implemented on regular lattices. This technique [1, 2]...
G. Korniss, M. A. Novotny, A. K. Kolakowska, H. Gu...