Sciweavers

10038 search results - page 1781 / 2008
» Model Checking for Managers
Sort
View
132
Voted
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
15 years 11 months ago
Detecting Link Spam Using Temporal Information
How to effectively protect against spam on search ranking results is an important issue for contemporary web search engines. This paper addresses the problem of combating one majo...
Guoyang Shen, Bin Gao, Tie-Yan Liu, Guang Feng, Sh...
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech
ICMCS
2006
IEEE
112views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Visual Feature Space Analysis for Unsupervised Effectiveness Estimation and Feature Engineering
The Feature Vector approach is one of the most popular schemes for managing multimedia data. For many data types such as audio, images, or 3D models, an abundance of different Fea...
Tobias Schreck, Daniel A. Keim, Christian Panse
IEEEARES
2006
IEEE
15 years 11 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger
IEEESCC
2006
IEEE
15 years 11 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan
« Prev « First page 1781 / 2008 Last » Next »