Sciweavers

3012 search results - page 494 / 603
» Testing Processes of Web Applications
Sort
View
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
15 years 7 months ago
The Social Structure of Tagging Internet Video on del.icio.us
Abstract— The ability to tag resources with uncontrolled metadata or “folksonomies” is often characterized as one of the central features of “Web 2.0” applications. Folks...
John C. Paolillo, Shashikant Penumarthy
ICDCSW
2007
IEEE
15 years 7 months ago
Context to Make You More Aware
The goal of our work is to help users make more informed choices about what physical activities they undertake. One example is to provide relevant information to help someone choo...
Adrienne H. Andrew, Yaw Anokwa, Karl Koscher, Jona...
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
15 years 7 months ago
Analyses and Fundamental ideas for a Relation Extraction Approach
Relation extraction is a difficult open research problem with important applications in several fields such as knowledge management, web mining, ontology building, intelligent sys...
Lobna Karoui, Marie-Aude Aufaure, Nacéra Be...
AUSDM
2007
Springer
113views Data Mining» more  AUSDM 2007»
15 years 7 months ago
PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Sangeetha Kutty, Richi Nayak, Yuefeng Li
DRM
2007
Springer
15 years 7 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan