Sciweavers

511 search results - page 67 / 103
» Spelling Correction Using Context
Sort
View
168
Voted
SIGMOD
2006
ACM
126views Database» more  SIGMOD 2006»
16 years 21 days ago
Declarative networking: language, execution and optimization
The networking and distributed systems communities have recently explored a variety of new network architectures, both for applicationlevel overlay networks, and as prototypes for...
Boon Thau Loo, Tyson Condie, Minos N. Garofalakis,...
99
Voted
GPEM
2002
95views more  GPEM 2002»
15 years 9 days ago
On Appropriate Adaptation Levels for the Learning of Gene Linkage
A number of algorithms have been proposed aimed at tackling the problem of learning "Gene Linkage" within the context of genetic optimisation, that is to say, the problem...
James Smith
113
Voted
GI
2009
Springer
14 years 10 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
ICIP
2008
IEEE
16 years 2 months ago
Adaptive decoding for halftone orientation-based data hiding
Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...
Orhan Bulan, Gaurav Sharma, Vishal Monga
96
Voted
CHI
2007
ACM
16 years 28 days ago
CAAD: an automatic task support system
Recent HCI research shows a strong interest in task management systems (e.g. [19, 27]) that support the multitasked nature of information work [13]. These systems either require m...
Tye Rattenbury, John F. Canny