Sciweavers

7890 search results - page 1488 / 1578
» The MathSAT 3 System
Sort
View
CCS
2007
ACM
15 years 4 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
CLEF
2007
Springer
15 years 4 months ago
MIRACLE at ImageCLEFphoto 2007: Evaluation of Merging Strategies for Multilingual and Multimedia Information Retrieval
This paper describes the participation of MIRACLE research consortium at the ImageCLEF Photographic Retrieval task of ImageCLEF 2007. For this campaign, the main purpose of our ex...
Julio Villena-Román, Sara Lana-Serrano, Jos...
CLEF
2007
Springer
15 years 4 months ago
Using Pseudo-Relevance Feedback to Improve Image Retrieval Results
In this paper, we propose a pseudo-relevance feedback method to deal with the photographic retrieval and medical retrieval tasks of ImageCLEF 2007. The aim of our participation to...
Mouna Torjmen, Karen Pinel-Sauvagnat, Mohand Bough...
CLEF
2007
Springer
15 years 4 months ago
Simple Morpheme Labelling in Unsupervised Morpheme Analysis
This paper presents my participation to the second Morpho Challenge. Results have been obtained with the algorithm already presented at Morpho Challenge 2005. The system takes a p...
Delphine Bernhard
ECTEL
2007
Springer
15 years 4 months ago
Creation of Lithuanian Digital Library of Educational Resources and Services: the Hypothesis, Contemporary Practice, and Future
Currently national digital library of educational resources and services (DLE) for primary and secondary education is under implementation in Lithuania. The article aims to analyse...
Eugenijus Kurilovas, Svetlana Kubilinskiene
« Prev « First page 1488 / 1578 Last » Next »