Sciweavers

2229 search results - page 360 / 446
» Comparative analysis of biclustering algorithms
Sort
View
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
14 years 3 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
MM
2005
ACM
158views Multimedia» more  MM 2005»
14 years 3 months ago
Semantic knowledge extraction and annotation for web images
Nowadays, images have become widely available on the World Wide Web (WWW). It’s essential to develop effective ways for managing and retrieving such abundant images. Advantageou...
Zhigang Hua, Xiang-Jun Wang, Qingshan Liu, Hanqing...
SIGIR
2005
ACM
14 years 3 months ago
A phonotactic-semantic paradigm for automatic spoken document classification
We demonstrate a phonotactic-semantic paradigm for spoken document categorization. In this framework, we define a set of acoustic words instead of lexical words to represent acous...
Bin Ma, Haizhou Li
WOWMOM
2005
ACM
127views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Game Theoretic Power Aware Wireless Data Access
Abstract—This paper examines the following wireless data access scenario: a number of clients are interested in a set of data items kept at the server. A client sends a query req...
Mark Kai Ho Yeung, Yu-Kwong Kwok
AIRWEB
2005
Springer
14 years 3 months ago
Blocking Blog Spam with Language Model Disagreement
We present an approach for detecting link spam common in blog comments by comparing the language models used in the blog post, the comment, and pages linked by the comments. In co...
Gilad Mishne, David Carmel, Ronny Lempel