Sciweavers

1687 search results - page 194 / 338
» Which pointer analysis should I use
Sort
View
PAMI
2007
336views more  PAMI 2007»
15 years 4 months ago
Topological Equivalence between a 3D Object and the Reconstruction of Its Digital Image
— Digitization is not as easy as it looks. If one digitizes a 3D object even with a dense sampling grid, the reconstructed digital object may have topological distortions and in ...
Peer Stelldinger, Longin Jan Latecki, Marcelo Siqu...
159
Voted
SIGIR
2006
ACM
15 years 10 months ago
Mining dependency relations for query expansion in passage retrieval
Classical query expansion techniques such as the local context analysis (LCA) make use of term co-occurrence statistics to incorporate additional contextual terms for enhancing pa...
Renxu Sun, Chai-Huat Ong, Tat-Seng Chua
WWW
2005
ACM
16 years 5 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...
ETRA
2010
ACM
221views Biometrics» more  ETRA 2010»
15 years 11 months ago
Advanced gaze visualizations for three-dimensional virtual environments
Gaze visualizations represent an effective way for gaining fast insights into eye tracking data. Current approaches do not adequately support eye tracking studies for three-dimens...
Sophie Stellmach, Lennart Nacke, Raimund Dachselt
DOCENG
2008
ACM
15 years 6 months ago
PrintMonkey: giving users a grip on printing the web
Web content is notoriously difficult to capture on a printed page due to inconsistent and undesired results. Items that users may not want to print, such as media, navigation menu...
Jennifer Baldwin, James A. Rowson, Yvonne Coady