Sciweavers

2111 search results - page 321 / 423
» Understanding the Yarowsky Algorithm
Sort
View
165
Voted
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 6 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
123
Voted
CGF
2011
14 years 6 months ago
Blur-Aware Image Downsampling
Resizing to a lower resolution can alter the appearance of an image. In particular, downsampling an image causes blurred regions to appear sharper. It is useful at times to create...
Matthew Trentacoste, Rafal Mantiuk, Wolfgang Heidr...
HT
2011
ACM
14 years 5 months ago
Automatic mining of cognitive metadata using fuzzy inference
Personalized search and browsing is increasingly vital especially for enterprises to able to reach their customers. Key challenge in supporting personalization is the need for ric...
Melike Sah, Vincent Wade
JAMIA
2011
87views more  JAMIA 2011»
14 years 5 months ago
Can poison control data be used for pharmaceutical poisoning surveillance?
the title of a report to view the full citation and abstract. s of these reports are available now 169 unique articles this week Age: Adolescents A closer look at co-rumination: Ge...
Christopher A. Naun, Cody S. Olsen, J. Michael Dea...
JCDL
2011
ACM
244views Education» more  JCDL 2011»
14 years 5 months ago
Product review summarization from a deeper perspective
With product reviews growing in depth and becoming more numerous, it is growing challenge to acquire a comprehensive understanding of their contents, for both customers and produc...
Duy Khang Ly, Kazunari Sugiyama, Ziheng Lin, Min-Y...