Sciweavers

10301 search results - page 1930 / 2061
» informs 2007
Sort
View
CCS
2007
ACM
15 years 7 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
CIKM
2007
Springer
15 years 7 months ago
Effective top-k computation in retrieving structured documents with term-proximity support
Modern web search engines are expected to return top-k results efficiently given a query. Although many dynamic index pruning strategies have been proposed for efficient top-k com...
Mingjie Zhu, Shuming Shi, Mingjing Li, Ji-Rong Wen
CIKM
2007
Springer
15 years 7 months ago
Improving the classification of newsgroup messages through social network analysis
Newsgroup participants interact with their communities through conversation threads. They may respond to a message to answer a question, debate a topic, support or disagree with a...
Blaz Fortuna, Eduarda Mendes Rodrigues, Natasa Mil...
115
Voted
CIVR
2007
Springer
119views Image Analysis» more  CIVR 2007»
15 years 7 months ago
An in-memory relevance feedback technique for high-performance image retrieval systems
Content-based image retrieval with relevant feedback has been widely adopted as the query model of choice for improved effectiveness in image retrieval. The effectiveness of thi...
Ning Yu, Khanh Vu, Kien A. Hua
CIVR
2007
Springer
231views Image Analysis» more  CIVR 2007»
15 years 7 months ago
Classification of video events using 4-dimensional time-compressed motion features
Among the various types of semantic concepts modeled, events pose the greatest challenge in terms of computational power needed to represent the event and accuracy that can be ach...
Alexander Haubold, Milind R. Naphade
« Prev « First page 1930 / 2061 Last » Next »