Sciweavers

1629 search results - page 101 / 326
» A Study of Malcode-Bearing Documents
Sort
View
143
Voted
ADBIS
2006
Springer
165views Database» more  ADBIS 2006»
15 years 7 months ago
Fragmenting XML Documents via Structural Constraints
Abstract. XML query processors suffer from main-memory limitations that prevent them from processing large XML documents. While content-based predicates can be used to project down...
Angela Bonifati, Alfredo Cuzzocrea, Bruno Zinno
129
Voted
DAS
2006
Springer
15 years 5 months ago
Extraction and Analysis of Document Examiner Features from Vector Skeletons of Grapheme 'th'
Abstract. This paper presents a study of 25 structural features extracted from samples of grapheme `th' that correspond to features commonly used by forensic document examiner...
Vladimir Pervouchine, Graham Leedham
ICRE
1998
IEEE
15 years 7 months ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
141
Voted
CICLING
2006
Springer
15 years 7 months ago
A Comparative Evaluation of a New Unsupervised Sentence Boundary Detection Approach on Documents in English and Portuguese
Abstract. In this paper, we describe a new unsupervised sentence boundary detection system and present a comparative study evaluating its performance against different systems foun...
Jan Strunk, Carlos Nascimento Silla Jr., Celso A. ...
115
Voted
FPLAY
2008
15 years 5 months ago
Construction of cybertypes in Lineage II: an analysis of game interfaces and support documentation
This paper discusses social exclusion by analyzing the avatar creation interface of the massively multiplayer online roleplaying game (MMORPG) Lineage II. We use a previously deve...
Victoria McArthur, Tyler M. Pace, Aaron R. Houssia...