Sciweavers

1036 search results - page 194 / 208
» Report on INEX 2009
Sort
View
ISSTA
2009
ACM
15 years 4 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
MM
2009
ACM
137views Multimedia» more  MM 2009»
15 years 4 months ago
Lightweight web image reranking
Web image search is inspired by text search techniques; it mainly relies on indexing textual data that surround the image file. But retrieval results are often noisy and image pro...
Adrian Popescu, Pierre-Alain Moëllic, Ioannis...
MM
2009
ACM
147views Multimedia» more  MM 2009»
15 years 4 months ago
Distribution-based concept selection for concept-based video retrieval
Query-to-concept mapping plays one of the keys to concept-based video retrieval. Conventional approaches try to find concepts that are likely to co-occur in the relevant shots fro...
Juan Cao, HongFang Jing, Chong-Wah Ngo, Yongdong Z...
PETRA
2009
ACM
15 years 4 months ago
A technological infrastructure design for a pediatric oncology network
In Italy, the service of Pediatric oncology is very centralized and granted by high-specialized medical structures. In the Italian Regione Campania there are just few of such medi...
Aniello Murano
SACMAT
2009
ACM
15 years 4 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode