Sciweavers

1629 search results - page 105 / 326
» A Study of Malcode-Bearing Documents
Sort
View
ICSM
2006
IEEE
15 years 9 months ago
Guiding the Application of Design Patterns Based on UML Models
Software design patterns are documented best practice solutions that can be applied to reoccurring problems. Although well documented, there are often opportunities to apply them ...
Lionel C. Briand, Yvan Labiche, Alexandre Sauve
104
Voted
ICDAR
2005
IEEE
15 years 9 months ago
Caption Localisation in Video Sequences by Fusion of Multiple Detectors
In this article, we focus on the problem of caption detection in video sequences. Contrary to most of existing approaches based on a single detector followed by an ad hoc and cost...
Sébastien Lefèvre, Nicole Vincent
ICDAR
2005
IEEE
15 years 9 months ago
Prototype Learning Methods for Online Handwriting Recognition
In this paper, we study different methods for prototype selection for recognizing handwritten characters of Tamil script. In the first method, cumulative pairwise- distances of th...
B. S. Raghavendra, C. K. Narayanan, G. Sita, A. G....
DOCENG
2004
ACM
15 years 8 months ago
Logic-based XPath optimization
XPath [16] was introduced by the W3C as a standard language for specifying node selection, matching conditions, and for computing values from an XML document. XPath is now used in...
Pierre Genevès, Jean-Yves Vion-Dury
122
Voted
WWW
2010
ACM
15 years 8 months ago
Keyword search over key-value stores
Key-value stores (KVSs) are the most prevalent storage systems for large scale web services. As they do not have the structural complexities of RDBMSs, they are more efficient. In...
Arash Termehchy, Marianne Winslett