Sciweavers

1766 search results - page 286 / 354
» An Analysis of Information Content Present in Protein-DNA In...
Sort
View
FC
2009
Springer
106views Cryptology» more  FC 2009»
14 years 3 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
CEAS
2007
Springer
14 years 3 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
CIVR
2007
Springer
149views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Video copy detection: a comparative study
This paper presents a comparative study of methods for video copy detection. Different state-of-the-art techniques, using various kinds of descriptors and voting functions, are d...
Julien Law-To, Li Chen, Alexis Joly, Ivan Laptev, ...
JCDL
2006
ACM
99views Education» more  JCDL 2006»
14 years 2 months ago
Using resources across educational digital libraries
This article reports on analyses of usage and design activities by users of the Instructional Architect (IA), an end-user authoring tool designed to support easy access to and use...
Mimi Recker, Bart Palmer
MIR
2006
ACM
162views Multimedia» more  MIR 2006»
14 years 2 months ago
Dynamic similarity search in multi-metric spaces
An important research issue in multimedia databases is the retrieval of similar objects. For most applications in multimedia databases, an exact search is not meaningful. Thus, mu...
Benjamin Bustos, Tomás Skopal