Sciweavers

2312 search results - page 100 / 463
» From Effect to Effectiveness: The Missing Research Questions
Sort
View
ICDE
2012
IEEE
238views Database» more  ICDE 2012»
13 years 1 months ago
Mining Knowledge from Data: An Information Network Analysis Approach
Abstract—Most objects and data in the real world are interconnected, forming complex, heterogeneous but often semistructured information networks. However, many database research...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
FGR
2008
IEEE
166views Biometrics» more  FGR 2008»
15 years 1 months ago
Recognizing talking faces from acoustic Doppler reflections
Face recognition algorithms typically deal with the classification of static images of faces that are obtained using a camera. In this paper we propose a new sensing mechanism bas...
Kaustubh Kalgaonkar, Bhiksha Raj
ATAL
2008
Springer
15 years 1 months ago
Resource limitations, transmission costs and critical thresholds in scale-free networks
Whether or not a critical threshold exists when epidemic diseases are spread in complex networks is a problem attracting attention from researchers in several disciplines. In 2001...
Chung-Yuan Huang, Chuen-Tsai Sun, Chia-Ying Cheng,...
DLOG
2006
15 years 27 days ago
Tableau Caching for Description Logics with Inverse and Transitive Roles
Abstract. Modern description logic (DL) reasoners are known to be less efficient for DLs with inverse roles. The current loss of performance is largely due to the missing applicabi...
Yu Ding, Volker Haarslev
ICSE
2008
IEEE-ACM
16 years 9 days ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su