Sciweavers

5575 search results - page 1003 / 1115
» Information Extraction
Sort
View
137
Voted
ETRA
2010
ACM
197views Biometrics» more  ETRA 2010»
15 years 10 months ago
Image ranking with implicit feedback from eye movements
In order to help users navigate an image search system, one could provide explicit information on a small set of images as to which of them are relevant or not to their task. Thes...
David R. Hardoon, Kitsuchart Pasupa
130
Voted
SAC
2010
ACM
15 years 10 months ago
Web-based graphical querying of databases through an ontology: the Wonder system
Biological scientists have made large amounts of data available on the Web, which can be accessed by canned or precomputed queries presented via web forms. To satisfy further info...
Diego Calvanese, C. Maria Keet, Werner Nutt, Maria...
144
Voted
SAC
2009
ACM
15 years 10 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
WSDM
2009
ACM
136views Data Mining» more  WSDM 2009»
15 years 10 months ago
Mining common topics from multiple asynchronous text streams
Text streams are becoming more and more ubiquitous, in the forms of news feeds, weblog archives and so on, which result in a large volume of data. An effective way to explore the...
Xiang Wang 0002, Kai Zhang, Xiaoming Jin, Dou Shen
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 10 months ago
Video copy detection by fast sequence matching
Sequence matching techniques are effective for comparing two videos. However, existing approaches suffer from demanding computational costs and thus are not scalable for large-sca...
Mei-Chen Yeh, Kwang-Ting Cheng
« Prev « First page 1003 / 1115 Last » Next »