Sciweavers

1629 search results - page 156 / 326
» A Study of Malcode-Bearing Documents
Sort
View
ICDAR
2005
IEEE
14 years 2 months ago
Unconstrained Numeral Pair Recognition Using Enhanced Error Correcting Output Coding: A Holistic Approach
– This paper describes a new approach to recognize touching numeral strings. Currently most methods for numeral string recognition require segmenting the string image into separa...
Jie Zhou, Ching Y. Suen
ICAIL
2005
ACM
14 years 2 months ago
Constructing a Semantic Network for Legal Content
The Dutch Tax and Customs Administration (DTCA) is one of many organizations that deal with a multitude of electronic legal data, from various sources and in different formats. In...
Radboud Winkels, Alexander Boer, Emile de Maat, To...
SIGIR
2005
ACM
14 years 2 months ago
Indexing emails and email threads for retrieval
Electronic mail poses a number of unusual challenges for the design of information retrieval systems and test collections, including informal expression, conversational structure,...
Yejun Wu, Douglas W. Oard
GCC
2005
Springer
14 years 2 months ago
Coordinated Placement and Replacement for Grid-Based Hierarchical Web Caches
Web caching has been well accepted as a viable method for saving network bandwidth and reducing user access latency. To provide cache sharing on a large scale, hierarchical web cac...
Wenzhong Li, Kun Wu, Xu Ping, Ye Tao, Sanglu Lu, D...
OOPSLA
2005
Springer
14 years 2 months ago
Using refactorings to automatically update component-based applications
Frameworks and libraries change their APIs during evolution. Migrating an application to the new API is tedious and disrupts the development process. Although some tools and techn...
Danny Dig