Sciweavers

2874 search results - page 484 / 575
» Intrusion Detection: Systems and Models
Sort
View
WWW
2005
ACM
16 years 16 days ago
Using visual cues for extraction of tabular data from arbitrary HTML documents
We describe a method to extract tabular data from web pages. Rather than just analyzing the DOM tree, we also exploit visual cues in the rendered version of the document to extrac...
Bernhard Krüpl, Marcus Herzog, Wolfgang Gatte...
WWW
2004
ACM
16 years 16 days ago
Providing ranked relevant results for web database queries
Often Web database users experience difficulty in articulating their needs using a precise query. Providing ranked set of possible answers would benefit such users. We propose to ...
Ullas Nambiar, Subbarao Kambhampati
ICRA
2009
IEEE
113views Robotics» more  ICRA 2009»
15 years 6 months ago
Visual topological SLAM and global localization
— Visual localization and mapping for mobile robots has been achieved with a large variety of methods. Among them, topological navigation using vision has the advantage of offeri...
Adrien Angeli, Stéphane Doncieux, Jean-Arca...
ADBIS
2009
Springer
151views Database» more  ADBIS 2009»
15 years 6 months ago
Rule-Based Management of Schema Changes at ETL Sources
In this paper, we visit the problem of the management of inconsistencies emerging on ETL processes as results of evolution operations g at their sources. We abstract Extract-Transf...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
CRV
2007
IEEE
232views Robotics» more  CRV 2007»
15 years 6 months ago
Automatic Annotation of Humans in Surveillance Video
In this paper we present a system for automatic annotation of humans passing a surveillance camera. Each human has 4 associated annotations: the primary color of the clothing, the...
D. M. Hansen, Bjarne K. Mortensen, P. T. Duizer, J...