Sciweavers

452 search results - page 68 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
IBPRIA
2003
Springer
15 years 2 months ago
A Colour Tracking Procedure for Low-Cost Face Desktop Applications
In this paper we present an environment for the tracking of a human face obtained from a real video sequence. We will describe the system and discuss the advantages and disadvanta...
Francisco J. Perales López, Ramon Mas, Miqu...
KBSE
2009
IEEE
15 years 4 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
CHI
2008
ACM
15 years 10 months ago
On the benefits of confidence visualization in speech recognition
In a typical speech dictation interface, the recognizer's bestguess is displayed as normal, unannotated text. This ignores potentially useful information about the recognizer...
Keith Vertanen, Per Ola Kristensson
BMCBI
2007
151views more  BMCBI 2007»
14 years 9 months ago
A comparison study on algorithms of detecting long forms for short forms in biomedical text
Motivation: With more and more research dedicated to literature mining in the biomedical domain, more and more systems are available for people to choose from when building litera...
Manabu Torii, Zhang-Zhi Hu, Min Song, Cathy H. Wu,...
CIG
2005
IEEE
15 years 3 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai