Sciweavers

1437 search results - page 256 / 288
» Content Extraction Signatures
Sort
View
COMPUTER
2000
180views more  COMPUTER 2000»
13 years 8 months ago
The Challenges of Automatic Summarization
tion--the art of abstracting key content from one or more information sources--has become an integral part of everyday life. People keep abreast of world affairs by listening to ne...
Udo Hahn, Inderjeet Mani
IJIG
2002
126views more  IJIG 2002»
13 years 8 months ago
Finding the Beat: An Analysis of the Rhythmic Elements of Motion Pictures
This paper forms a continuation of our work focused on exploiting film grammar for the task of automated film understanding. We examine film rhythm, a powerful narrative concept u...
Brett Adams, Chitra Dorai, Svetha Venkatesh
PAMI
2007
107views more  PAMI 2007»
13 years 8 months ago
Recognition of Pornographic Web Pages by Classifying Texts and Images
—With the rapid development of the World Wide Web, people benefit more and more from the sharing of information. However, Web pages with obscene, harmful, or illegal content can ...
Weiming Hu, Ou Wu, Zhouyao Chen, Zhouyu Fu, Stephe...
SCFBM
2008
151views more  SCFBM 2008»
13 years 8 months ago
Wndchrm - an open source utility for biological image analysis
Background: Biological imaging is an emerging field, covering a wide range of applications in biological and clinical research. However, while machinery for automated experimentin...
Lior Shamir, Nikita Orlov, D. Mark Eckley, Tomasz ...
JCS
2010
135views more  JCS 2010»
13 years 7 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...