Sciweavers

1828 search results - page 280 / 366
» From Features to Semantics: Some Preliminary Results
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
TKDE
2008
195views more  TKDE 2008»
14 years 9 months ago
Learning a Maximum Margin Subspace for Image Retrieval
One of the fundamental problems in Content-Based Image Retrieval (CBIR) has been the gap between low-level visual features and high-level semantic concepts. To narrow down this gap...
Xiaofei He, Deng Cai, Jiawei Han
IDT
2010
125views more  IDT 2010»
14 years 8 months ago
Automatic fusion of knowledge stored in ontologies
A person adds new knowledge to his/her mind, taking into account new information, additional details, better precision, synonyms, homonyms, redundancies, apparent contradictions, a...
Alma-Delia Cuevas, Adolfo Guzmán-Arenas
TASLP
2011
14 years 4 months ago
Estimating Dominance in Multi-Party Meetings Using Speaker Diarization
—With the increase in cheap commercially available sensors, recording meetings is becoming an increasingly practical option. With this trend comes the need to summarize the recor...
Hayley Hung, Yan Huang, Gerald Friedland, Daniel G...
ICSE
2012
IEEE-ACM
13 years 8 days ago
Detecting similar software applications
—Although popular text search engines allow users to retrieve similar web pages, source code search engines do not have this feature. Detecting similar applications is a notoriou...
Collin McMillan, Mark Grechanik, Denys Poshyvanyk