Sciweavers

1456 search results - page 159 / 292
» Keeping encountered information
Sort
View
104
Voted
ACSAC
2001
IEEE
15 years 5 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
106
Voted
SPIEVIP
2008
15 years 4 months ago
Adaptive methods of two-scale edge detection in post-enhancement visual pattern processing
Adaptive methods are defined and experimentally studied for a two-scale edge detection process that mimics human visual perception of edges and is inspired by the parvo-cellular (...
Zia-ur Rahman, Daniel J. Jobson, Glenn A. Woodell
112
Voted
CIKM
2008
Springer
15 years 3 months ago
Large-scale, parallel automatic patent annotation
When researching new product ideas or filing new patents, inventors need to retrieve all relevant pre-existing know-how and/or to exploit and enforce patents in their technologica...
Milan Agatonovic, Niraj Aswani, Kalina Bontcheva, ...
130
Voted
ANLP
1997
190views more  ANLP 1997»
15 years 3 months ago
Disambiguation of Proper Names in Text
Identifying the occurrences of proper names in text and the entities they refer to can be a difficult task because of the manyto-many mapping between names and their referents. We...
Nina Wacholder, Yael Ravin, Misook Choi
128
Voted
BMCBI
2008
163views more  BMCBI 2008»
15 years 2 months ago
Gene Ontology term overlap as a measure of gene functional similarity
Background: The availability of various high-throughput experimental and computational methods allows biologists to rapidly infer functional relationships between genes. It is oft...
Meeta Mistry, Paul Pavlidis