Sciweavers

2715 search results - page 540 / 543
» Database Publication Practices
Sort
View
IEEECIT
2010
IEEE
13 years 7 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
ISSRE
2010
IEEE
13 years 7 months ago
Automating System Tests Using Declarative Virtual Machines
—Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system’s source code...
Sander van der Burg, Eelco Dolstra
JIDM
2010
155views more  JIDM 2010»
13 years 7 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...
PR
2010
126views more  PR 2010»
13 years 7 months ago
Discriminability and reliability indexes: Two new measures to enhance multi-image face recognition
In order to handle complex face image variations in face recognition, multi-image face recognition has been proposed, instead of using a single still-imagebased approach. In many ...
Weiwen Zou, Pong C. Yuen
PKDD
2010
Springer
235views Data Mining» more  PKDD 2010»
13 years 6 months ago
Online Structural Graph Clustering Using Frequent Subgraph Mining
The goal of graph clustering is to partition objects in a graph database into different clusters based on various criteria such as vertex connectivity, neighborhood similarity or t...
Madeleine Seeland, Tobias Girschick, Fabian Buchwa...