Sciweavers

511 search results - page 53 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
111
Voted
UIST
1995
ACM
15 years 7 months ago
Hands-on Demonstration: Interacting with SpeechSkimmer
SpeechSkimmer is an interactive system for quickly browsing and finding information in speech recordings. Skimming speech recordings is much more difficult than visually scanning ...
Barry Arons
IRI
2005
IEEE
15 years 9 months ago
Towards scalable and adaptable software architectures
Developing scalable and adaptable architectures that can accommodate evolving changes is crucial for reducing software development cost. To achieve scalability and adaptability, d...
Mohamed Fayad, Haitham S. Hamza, Huáscar A....
CIKM
2005
Springer
15 years 9 months ago
Rotation invariant indexing of shapes and line drawings
We present data representations, distance measures and organizational structures for fast and efficient retrieval of similar shapes in image databases. Using the Hough Transform w...
Michail Vlachos, Zografoula Vagena, Philip S. Yu, ...
ACMSE
2006
ACM
15 years 9 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
TREC
2004
15 years 5 months ago
UIC at TREC 2004: Robust Track
In TREC 2004, the Database and Information System Lab (DBIS) at University of Illinois at Chicago (UIC) participates in the robust track, which is a traditional ad hoc retrieval t...
Shuang Liu, Chaojing Sun, Clement T. Yu