Sciweavers

1605 search results - page 260 / 321
» Automatic Set Instance Extraction using the Web
Sort
View
EC
2008
146views ECommerce» more  EC 2008»
13 years 7 months ago
Automated Discovery of Local Search Heuristics for Satisfiability Testing
The development of successful metaheuristic algorithms such as local search for a difficult problems such as satisfiability testing (SAT) is a challenging task. We investigate an ...
Alex S. Fukunaga
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
CGO
2006
IEEE
14 years 1 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
CIKM
2011
Springer
12 years 7 months ago
Effective retrieval of resources in folksonomies using a new tag similarity measure
Social (or folksonomic) tagging has become a very popular way to describe content within Web 2.0 websites. However, as tags are informally defined, continually changing, and ungo...
Giovanni Quattrone, Licia Capra, Pasquale De Meo, ...
CAIP
1999
Springer
180views Image Analysis» more  CAIP 1999»
14 years 1 days ago
A Scale-Space Approach to Face Recognition from Profiles
A method for face recognition using profile images based on the scale-space filtering is presented in this paper. A grey-level image of profile is thresholded to produce a binary, ...
Zdravko Liposcak, Sven Loncaric