Sciweavers

1759 search results - page 187 / 352
» Using term informativeness for named entity detection
Sort
View
101
Voted
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 8 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
93
Voted
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
15 years 4 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl
74
Voted
CHI
2010
ACM
15 years 5 months ago
Tangible spin cube for 3D ring menu in real space
In this paper, we introduce a novel interface, the Tangible Spin Cube, for experiencing a 3D ring menu in real space. It enables a tangible object-referenced 3D ring menu and its ...
Hyeongmook Lee, Woontack Woo
CVPR
2008
IEEE
16 years 6 days ago
Taylor expansion based classifier adaptation: Application to person detection
Because of the large variation across different environments, a generic classifier trained on extensive data-sets may perform sub-optimally in a particular test environment. In th...
Cha Zhang, Raffay Hamid, Zhengyou Zhang
WWW
2008
ACM
15 years 11 months ago
Web graph similarity for anomaly detection (poster)
Web graphs are approximate snapshots of the web, created by search engines. Their creation is an error-prone procedure that relies on the availability of Internet nodes and the fa...
Panagiotis Papadimitriou 0002, Ali Dasdan, Hector ...