Sciweavers

4429 search results - page 785 / 886
» An Algorithm for Knowledge Base Extraction
Sort
View
WISA
2004
Springer
14 years 2 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
CEC
2003
IEEE
14 years 2 months ago
An evolutionary approach for reducing the switching activity in address buses
In this paper we present two new approaches based on genetic algorithms (GA) to reduce power consumption by communication buses in an embedded system. The first approach makes it ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
ICDAR
2003
IEEE
14 years 2 months ago
Photo time-stamp detection and recognition
This paper addresses the problem of photo time-stamp detection and recognition, which is to determine the time a photo was taken. Since the time-stamp is exposed together with the...
Xiang-Rong Chen, HongJiang Zhang
CIKM
2003
Springer
14 years 2 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
GRID
2003
Springer
14 years 2 months ago
Predicting the Performance of Globus Monitoring and Discovery Service (MDS-2) Queries
Resource discovery and monitoring in a distributed Grid environment gives rise to several issues, one of which is the provision of reliable performance and hence, the quality-ofse...
Helene N. Lim Choi Keung, Justin R. D. Dyson, Step...