Sciweavers

629 search results - page 89 / 126
» Business Process Integration: Method and Analysis
Sort
View
IASTEDSEA
2004
13 years 10 months ago
Java bytecode verification with dynamic structures
Java applets run on a Virtual Machine that checks code's integrity and correctness before execution using a module called Bytecode Verifier. Java Card technology allows Java ...
Cinzia Bernardeschi, Luca Martini, Paolo Masci
WWW
2011
ACM
13 years 3 months ago
Wikipedia vandalism detection
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
Santiago Moisés Mola-Velasco
MHCI
2009
Springer
14 years 3 months ago
Detecting physical shock by a mobile phone and its applications in security and emergency
In this paper, we propose a method for detecting physical shock by a mobile phone and its applications in security and emergency scenarios. We use acceleration signal provided by ...
Hamed Ketabdar
ESWS
2007
Springer
14 years 2 months ago
Acquisition of OWL DL Axioms from Lexical Resources
State-of-the-art research on automated learning of ontologies from text currently focuses on inexpressive ontologies. The acquisition of complex axioms involving logical connective...
Johanna Völker, Pascal Hitzler, Philipp Cimia...
IBPRIA
2005
Springer
14 years 2 months ago
An Approach to Vision-Based Person Detection in Robotic Applications
We present an approach to vision-based person detection in robotic applications that integrates top down template matching with bottom up classifiers. We detect components of the ...
Carlos D. Castillo, Carolina Chang