Sciweavers

2399 search results - page 387 / 480
» Avatar Information Extraction System
Sort
View
JCDL
2004
ACM
114views Education» more  JCDL 2004»
15 years 9 months ago
Translating unknown cross-lingual queries in digital libraries using a web-based approach
Users’ cross-lingual queries to a digital library system might be short and not included in a common translation dictionary (unknown terms). In this paper, we investigate the fe...
Jenq-Haur Wang, Jei-Wen Teng, Pu-Jen Cheng, Wen-Hs...
APSEC
2003
IEEE
15 years 9 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
FUIN
2007
129views more  FUIN 2007»
15 years 4 months ago
Sound Isolation by Harmonic Peak Partition For Music Instrument Recognition
Abstract. Identification of music instruments in polyphonic sounds is difficult and challenging, especially where heterogeneous harmonic partials are overlapping with each other....
Xin Zhang, Zbigniew W. Ras
CASCON
2010
174views Education» more  CASCON 2010»
15 years 2 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
SAC
2009
ACM
15 years 11 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...