Sciweavers

283 search results - page 37 / 57
» Software Inspections We Can Trust
Sort
View
WWW
2009
ACM
15 years 10 months ago
Rethinking email message and people search
We show how a number of novel email search features can be implemented without any kind of natural language processing (NLP) or advanced data mining. Our approach inspects the ema...
Sebastian Michel, Ingmar Weber
112
Voted
MOBISEC
2009
Springer
15 years 4 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
ECWEB
2010
Springer
162views ECommerce» more  ECWEB 2010»
14 years 7 months ago
The Open Metaverse Currency (OMC) - A Micropayment Framework for Open 3D Virtual Worlds
: Virtual worlds have become very popular recently, in particular 3D virtual worlds with a built-in virtual currency that enables providers and users to monetize their creations. V...
Frank Kappe, Michael Steurer
BMCBI
2007
160views more  BMCBI 2007»
14 years 9 months ago
Dendroscope: An interactive viewer for large phylogenetic trees
Background: Research in evolution requires software for visualizing and editing phylogenetic trees, for increasingly very large datasets, such as arise in expression analysis or m...
Daniel H. Huson, Daniel C. Richter, Christian Raus...
ISM
2006
IEEE
173views Multimedia» more  ISM 2006»
14 years 9 months ago
Automatic Capture of Significant Points in a Computer Based Presentation
We describe an automatic classroom capture system that detects and records significant (stable) points in lectures by sampling and analyzing a sequence of screen capture frames fr...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...