Sciweavers

4564 search results - page 814 / 913
» Data Integration Using ID-Logic
Sort
View
ECIR
2010
Springer
13 years 7 months ago
Query Aspect Based Term Weighting Regularization in Information Retrieval
Abstract. Traditional retrieval models assume that query terms are independent and rank documents primarily based on various term weighting strategies including TF-IDF and document...
Wei Zheng, Hui Fang
UIST
2010
ACM
13 years 6 months ago
The IR ring: authenticating users' touches on a multi-touch display
Multi-touch displays are particularly attractive for collaborative work because multiple users can interact with applications simultaneously. However, unfettered access can lead t...
Volker Roth, Philipp Schmidt, Benjamin Gülden...
USS
2010
13 years 6 months ago
Adapting Software Fault Isolation to Contemporary CPU Architectures
Software Fault Isolation (SFI) is an effective approach to sandboxing binary code of questionable provenance, an interesting use case for native plugins in a Web browser. We prese...
David Sehr, Robert Muth, Cliff Biffle, Victor Khim...
WISEC
2010
ACM
13 years 6 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
BIBM
2009
IEEE
190views Bioinformatics» more  BIBM 2009»
13 years 6 months ago
A Fast, Semi-automatic Brain Structure Segmentation Algorithm for Magnetic Resonance Imaging
Abstract--Medical image segmentation has become an essential technique in clinical and research-oriented applications. Because manual segmentation methods are tedious, and fully au...
Kevin Karsch, Qing He, Ye Duan