Sciweavers

1146 search results - page 127 / 230
» Applications of the TAMPR Transformation System
Sort
View
KI
2002
Springer
15 years 4 months ago
Employing Text Mining for Semantic Tagging in DIAsDEM
Both public and private organizations have been accumulating large volumes of electronically available text documents for the past years. However, to turn text archives into profi...
Karsten Winkler, Myra Spiliopoulou
MASS
2010
110views Communications» more  MASS 2010»
15 years 2 months ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 8 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
JUCS
2007
104views more  JUCS 2007»
15 years 4 months ago
Real-time Architecture for Robust Motion Estimation under Varying Illumination Conditions
: Motion estimation from image sequences is a complex problem which requires high computing resources and is highly affected by changes in the illumination conditions in most of th...
Javier Díaz, Eduardo Ros, Rafael Rodr&iacut...
ICLP
1989
Springer
15 years 8 months ago
A Simple Code Improvement Scheme for Prolog
The generation of efficient code for Prolog programs requires sophisticated code transformation and optimization systems. Much of the recent work in this area has focussed on hig...
Saumya K. Debray