Sciweavers

16504 search results - page 3279 / 3301
» New Problems, New Solutions
Sort
View
TSD
2010
Springer
15 years 10 days ago
Evaluation of a Sentence Ranker for Text Summarization Based on Roget's Thesaurus
Abstract. Evaluation is one of the hardest tasks in automatic text summarization. It is perhaps even harder to determine how much a particular component of a summarization system c...
Alistair Kennedy, Stan Szpakowicz
WINET
2010
105views more  WINET 2010»
15 years 9 days ago
Flow rank based probabilistic fair scheduling for wireless ad hoc networks
Fair scheduling is an ideal candidate for fair bandwidth sharing and thereby achieving fairness among the contending flows in a network. It is particularly challenging for ad hoc ...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...
ACSAC
2010
IEEE
15 years 4 hour ago
Multi-vendor penetration testing in the advanced metering infrastructure
- The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy...
Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Mia...
BMVC
2010
14 years 12 months ago
Recognizing human actions in still images: a study of bag-of-features and part-based representations
Recognition of human actions is usually addressed in the scope of video interpretation. Meanwhile, common human actions such as "reading a book", "playing a guitar&...
Vincent Delaitre, Ivan Laptev, Josef Sivic
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 12 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
« Prev « First page 3279 / 3301 Last » Next »