Sciweavers

3679 search results - page 694 / 736
» Hybrid Semantic Analysis
Sort
View
76
Voted
TKDE
2002
67views more  TKDE 2002»
15 years 3 days ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
95
Voted
MTA
2007
183views more  MTA 2007»
15 years 12 min ago
The design of a wireless real-time visual surveillance system
In this paper, we study the important issues in the design of an efficient WIreless real-time visual SurveillancE System (WISES). Two important considerations are to minimize: (1)...
Kam-yiu Lam, Calvin K. H. Chiu
PR
2007
101views more  PR 2007»
14 years 12 months ago
Use of power law models in detecting region of interest
In this paper, we shall address the issue of semantic extraction of different regions of interest. The proposed approach is based on statistical methods and models inspired from l...
Yves Caron, Pascal Makris, Nicole Vincent
89
Voted
MICS
2008
87views more  MICS 2008»
14 years 12 months ago
Spurious Disambiguation Errors and How to Get Rid of Them
The disambiguation approach to the input of formulae enables users of mathematical assistants to type correct formulae in a terse syntax close to the usual ambiguous mathematical n...
Claudio Sacerdoti Coen, Stefano Zacchiroli
SAC
2008
ACM
14 years 12 months ago
Pattern ranking for semi-automatic ontology construction
When developing semantic applications, the construction of ontologies is a crucial part. We are developing a semiautomatic ontology construction approach, OntoCase, relying on ont...
Eva Blomqvist