Sciweavers

2421 search results - page 366 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
JMM2
2008
107views more  JMM2 2008»
15 years 4 months ago
Dynamic Generation of SMIL-Based Multimedia Interfaces
The current heterogeneous world of networks and terminals combined with the generalized mobility of users pose telecommunications operators and service providers the challenge of d...
José Manuel Oliveira, Eurico Carrapatoso
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 8 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
UIC
2009
Springer
15 years 11 months ago
Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning
Abstract. In the last years, techniques for activity recognition have attracted increasing attention. Among many applications, a special interest is in the pervasive e-Health domai...
Daniele Riboni, Claudio Bettini
WSDM
2010
ACM
215views Data Mining» more  WSDM 2010»
16 years 1 months ago
GeoFolk: Latent spatial semantics in Web 2.0 social media
We describe an approach for multi-modal characterization of social media by combining text features (e.g. tags as a prominent example of short, unstructured text labels) with spat...
Sergej Sizov
ICML
2009
IEEE
15 years 11 months ago
A novel lexicalized HMM-based learning framework for web opinion mining
Merchants selling products on the Web often ask their customers to share their opinions and hands-on experiences on products they have purchased. As e-commerce is becoming more an...
Wei Jin, Hung Hay Ho