Sciweavers

1360 search results - page 245 / 272
» Risk Analysis with Information Described in Natural Language
Sort
View
TKDE
2008
125views more  TKDE 2008»
14 years 9 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
CLEF
2009
Springer
14 years 7 months ago
Exploiting Speech Recognition Transcripts for Narrative Peak Detection in Short-Form Documentaries
Narrative peaks are points at which the viewer perceives a spike in the level of dramatic tension within the narrative flow of a video. This paper reports on four approaches to na...
Martha Larson, Bart Jochems, Ewine Smits, Roeland ...
SOUPS
2009
ACM
15 years 4 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...
MICCAI
2001
Springer
15 years 2 months ago
Shape versus Size: Improved Understanding of the Morphology of Brain Structures
Standard practice in quantitative structural neuroimaging is a segmentation into brain tissue, subcortical structures, fluid space and lesions followed by volume calculations of gr...
Guido Gerig, Martin Styner, Martha Elizabeth Shent...
ENTCS
2006
128views more  ENTCS 2006»
14 years 10 months ago
Web Verification: Perspective and Challenges
The Web poses novel and interesting problems for both programming language design and verification--and their intersection. This paper provides a personal outline of one thread of...
Shriram Krishnamurthi