Sciweavers

8068 search results - page 1568 / 1614
» Java Data Objects
Sort
View
GFKL
2005
Springer
167views Data Mining» more  GFKL 2005»
15 years 3 months ago
Quantitative Text Typology: The Impact of Sentence Length
Abstract. This study focuses on the contribution of sentence length for a quantitative text typology. Therefore, 333 Slovenian texts are analyzed with regard to their sentence leng...
Emmerich Kelih, Peter Grzybek, Gordana Antic, Erns...
HPCC
2005
Springer
15 years 3 months ago
A Hybrid Web Server Architecture for Secure e-Business Web Applications
Nowadays the success of many e-commerce applications, such as on-line banking, depends on their reliability, robustness and security. Designing a web server architecture that keep...
Vicenç Beltran, David Carrera, Jordi Guitar...
ICMI
2005
Springer
215views Biometrics» more  ICMI 2005»
15 years 3 months ago
Multimodal multispeaker probabilistic tracking in meetings
Tracking speakers in multiparty conversations constitutes a fundamental task for automatic meeting analysis. In this paper, we present a probabilistic approach to jointly track th...
Daniel Gatica-Perez, Guillaume Lathoud, Jean-Marc ...
MDM
2005
Springer
118views Communications» more  MDM 2005»
15 years 3 months ago
kNR-tree: a novel R-tree-based index for facilitating spatial window queries on any k relations among N spatial relations in mob
The ever-increasing popularity of mobile applications coupled with the prevalence of spatial data has created the need for efficient processing of spatial queries in mobile enviro...
Anirban Mondal, Anthony K. H. Tung, Masaru Kitsure...
PET
2005
Springer
15 years 3 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
« Prev « First page 1568 / 1614 Last » Next »