Sciweavers

4529 search results - page 832 / 906
» Position Based Cryptography
Sort
View
129
Voted
CVPR
2010
IEEE
15 years 9 months ago
Tag-based Web Photo Retrieval Improved by Batch Mode Re-Tagging
Web photos in social media sharing websites such as Flickr are generally accompanied by rich but noisy textual descriptions (tags, captions, categories, etc.). In this paper, we p...
Lin Chen, Dong Xu, Wai-Hung Tsang, Jiebo Luo
86
Voted
CHI
2010
ACM
15 years 7 months ago
Perceptions and practices of usability in the free/open source software (FoSS) community
CT This paper presents results from a study examining perceptions and practices of usability in the free/open source software (FOSS) community. 27 individuals associated with 11 di...
Michael Terry, Matthew Kay, Ben Lafreniere
95
Voted
SAC
2010
ACM
15 years 7 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
BIBM
2009
IEEE
155views Bioinformatics» more  BIBM 2009»
15 years 7 months ago
Towards Reliable Isoform Quantification Using RNA-Seq Data
Background: In eukaryotes, alternative splicing often generates multiple splice variants from a single gene. Here weexplore the use of RNA sequencing (RNA-Seq) datasets to address...
Brian E. Howard, Steffen Heber
141
Voted
MSWIM
2009
ACM
15 years 7 months ago
A performance evaluation framework for fair solutions in ad hoc networks
Fairness in multihop ad hoc networks has received considerable attention in the literature. Many schemes have been proposed, which attempt to compute the “optimal” bit rates o...
Manos Dramitinos, Rémi Vannier, Isabelle Gu...