Sciweavers

197 search results - page 35 / 40
» A Model for Ranking Entities and Its Application to Wikipedi...
Sort
View
TDSC
2008
99views more  TDSC 2008»
13 years 7 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
SCP
2010
96views more  SCP 2010»
13 years 6 months ago
Enforcing structural regularities in software using IntensiVE
The design and implementation of a software system is often governed by a variety of coding conventions, design patterns, architectural guidelines, design rules, and other so-call...
Johan Brichau, Andy Kellens, Sergio Castro, Theo D...
ISWC
1997
IEEE
13 years 11 months ago
Stochasticks: Augmenting the Billiards Experience with Probabilistic Vision and Wearable Computers
We propose a practical application of wearable computing and augmented reality which enhances the game of billiards. A vision algorithm is implemented which operates in interactiv...
Tony Jebara, Cyrus Eyster, Joshua Weaver, Thad Sta...
ISMB
2007
13 years 9 months ago
A Chado case study: an ontology-based modular schema for representing genome-associated biological information
Motivation: A few years ago, FlyBase undertook to design a new database schema to store Drosophila data. It would fully integrate genomic sequence and annotation data with bibliog...
Chris Mungall, David B. Emmert
GIS
2010
ACM
13 years 6 months ago
Detecting nearly duplicated records in location datasets
The quality of a local search engine, such as Google and Bing Maps, heavily relies on its geographic datasets. Typically, these datasets are obtained from multiple sources, e.g., ...
Yu Zheng, Xixuan Fen, Xing Xie, Shuang Peng, James...