Sciweavers

10458 search results - page 1698 / 2092
» Modeling Features at Runtime
Sort
View
ISSA
2008
15 years 5 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
LREC
2008
90views Education» more  LREC 2008»
15 years 5 months ago
Yet another Platform for Extracting Knowledge from Corpora
The research field of "extracting knowledge bases from text collections" seems to be mature: its target and its working hypotheses are clear. In this paper we propose a ...
Francesca Fallucchi, Fabio Massimo Zanzotto
MVA
2007
207views Computer Vision» more  MVA 2007»
15 years 5 months ago
View-invariant Human Action Recognition Based on Factorization and HMMs
of the fundamental challenges of human action recognition is accounting for the variability that arises during video capturing. For a specific action class, the 2D observations of...
Xi Li, Kazuhiro Fukui
RIAO
2007
15 years 5 months ago
Using Prior Information Derived from Citations in Literature Search
Researchers spent a large amount of their time searching through an ever increasing number of scientific articles. Although users of scientific search engines prefer the ranking o...
Edgar Meij, Maarten de Rijke
DGO
2004
112views Education» more  DGO 2004»
15 years 5 months ago
Exploration and Exploitation: Knowledge Sharing in Digital Government Projects
This paper examines knowledge sharing processes in digital government projects (DGPs). Although knowledge sharing processes are a central feature of the functioning of government,...
Maria Christina Binz-Scharf
« Prev « First page 1698 / 2092 Last » Next »