Sciweavers

1355 search results - page 158 / 271
» PaperSpace: a system for managing digital and paper document...
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 5 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
137
Voted
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
15 years 1 months ago
Expressive and flexible access to web-extracted data: a keyword-based structured query language
Automated extraction of structured data from Web sources often leads to large heterogeneous knowledge bases (KB), with data and schema items numbering in the hundreds of thousands...
Jeffrey Pound, Ihab F. Ilyas, Grant E. Weddell
ACMDIS
2010
ACM
14 years 11 months ago
Design's processional character
In this paper, we examine the ideas behind and reactions to a prototype online tool designed, in-house, for an art college's interaction design department. The web-based prot...
Laurel Swan, Diana Tanase, Alex S. Taylor
AAAI
2006
15 years 2 months ago
OntoSearch: A Full-Text Search Engine for the Semantic Web
OntoSearch, a full-text search engine that exploits ontological knowledge for document retrieval, is presented in this paper. Different from other ontology based search engines, O...
Xing Jiang, Ah-Hwee Tan
IH
1999
Springer
15 years 5 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel