Sciweavers

988 search results - page 34 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
CLEF
2008
Springer
15 years 1 months ago
Assessing the Impact of Thesaurus-Based Expansion Techniques in QA-Centric IR
In this paper, we assess the impact of using thesaurus-based query expansion methods, at the Information Retrieval (IR) stage of a Question Answering (QA) system. We focus on expan...
Luís Sarmento, Jorge Teixeira, Eugén...
HOTNETS
2010
14 years 6 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...
ACSAC
2009
IEEE
15 years 6 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
GEOINFORMATICA
2008
123views more  GEOINFORMATICA 2008»
14 years 12 months ago
Efficient Implementation Techniques for Topological Predicates on Complex Spatial Objects
Topological relationships like overlap, inside, meet, and disjoint uniquely characterize the relative position between objects in space. For a long time, they have been a focus of...
Reasey Praing, Markus Schneider
GLVLSI
2003
IEEE
146views VLSI» more  GLVLSI 2003»
15 years 5 months ago
A practical CAD technique for reducing power/ground noise in DSM circuits
One of the fundamental problems in Deep Sub Micron (DSM) circuits is Simultaneous Switching Noise (SSN), which causes voltage fluctuations in the circuit power/ground networks. In...
Arindam Mukherjee, Krishna Reddy Dusety, Rajsaktis...