Sciweavers

2013 search results - page 333 / 403
» Happy New Year
Sort
View
CCS
2007
ACM
15 years 6 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
CIKM
2007
Springer
15 years 6 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
CLEAR
2007
Springer
166views Biometrics» more  CLEAR 2007»
15 years 6 months ago
The IBM Rich Transcription 2007 Speech-to-Text Systems for Lecture Meetings
The paper describes the IBM systems submitted to the NIST Rich Transcription 2007 (RT07) evaluation campaign for the speechto-text (STT) and speaker-attributed speech-to-text (SAST...
Jing Huang, Etienne Marcheret, Karthik Visweswaria...
CSL
2007
Springer
15 years 6 months ago
From Proofs to Focused Proofs: A Modular Proof of Focalization in Linear Logic
Abstract. Probably the most significant result concerning cut-free sequent calculus proofs in linear logic is the completeness of focused proofs. This completeness theorem has a n...
Dale Miller, Alexis Saurin
ECTEL
2007
Springer
15 years 6 months ago
ALOE - A Socially Aware Learning Resource and Metadata Hub
The changing nature of e-Learning, the Web, and its users that can be observed in the last years results in a need for new approaches and technologies to fully exploit the existing...
Martin Memmel, Rafael Schirru