Sciweavers

1900 search results - page 346 / 380
» Crowdsourcing for relevance evaluation
Sort
View
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
CSB
2005
IEEE
146views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Multi-Metric and Multi-Substructure Biclustering Analysis for Gene Expression Data
A good number of biclustering algorithms have been proposed for grouping gene expression data. Many of them have adopted matrix norms to define the similarity score of a bicluste...
Sun-Yuan Kung, Man-Wai Mak, Ilias Tagkopoulos
ISM
2005
IEEE
133views Multimedia» more  ISM 2005»
14 years 1 months ago
Image Based Tracking of News Stories
Broadcasters often reuse video clips while reporting news stories. New clips are added to the story as it develops replacing old clips. A subset of these video clips may be replay...
Jedrzej Z. Miadowicz, John M. Gauch, Abhishek Shiv...
MM
2005
ACM
160views Multimedia» more  MM 2005»
14 years 1 months ago
Putting active learning into multimedia applications: dynamic definition and refinement of concept classifiers
The authors developed an extensible system for video exploitation that puts the user in control to better accommodate novel situations and source material. Visually dense displays...
Ming-yu Chen, Michael G. Christel, Alexander G. Ha...
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu