Sciweavers

1851 search results - page 276 / 371
» Open Source AI
Sort
View
ICCS
2004
Springer
15 years 8 months ago
Improving Generalization Level in UML Models Iterative Cross Generalization in Practice
FCA has been successfully applied to software engineering tasks such as source code analysis and class hierarchy re-organization. Most notably, FCA hematics behind the mechanism of...
Michel Dao, Marianne Huchard, Mohamed Rouane Hacen...
IWDW
2004
Springer
15 years 8 months ago
Informed Detection Revisited
Abstract. Watermarking systems can employ either informed detection, where the original cover work is required, or blind detection, where it is not required. While early systems us...
Jeffrey A. Bloom, Matthew L. Miller
SEMWEB
2004
Springer
15 years 8 months ago
Bibster - A Semantics-Based Bibliographic Peer-to-Peer System
Abstract. This paper describes the design and implementation of Bibster, a Peer-to-Peer system for exchanging bibliographic data among researchers. Bibster exploits ontologies in d...
Peter Haase, Jeen Broekstra, Marc Ehrig, Maarten M...
ECCV
2010
Springer
15 years 8 months ago
Word Spotting in the Wild
We present a method for spotting words in the wild, i.e., in real images taken in unconstrained environments. Text found in the wild has a surprising range of difficulty. At one en...
120
Voted
EUROSEC
2010
ACM
15 years 8 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani