Sciweavers

4752 search results - page 857 / 951
» Dependability in Web Software
Sort
View
ICDM
2009
IEEE
164views Data Mining» more  ICDM 2009»
14 years 4 months ago
iTopicModel: Information Network-Integrated Topic Modeling
—Document networks, i.e., networks associated with text information, are becoming increasingly popular due to the ubiquity of Web documents, blogs, and various kinds of online da...
Yizhou Sun, Jiawei Han, Jing Gao, Yintao Yu
BTW
2009
Springer
145views Database» more  BTW 2009»
14 years 4 months ago
Retrieving Metadata for Your Local Scholarly Papers
: We present a novel approach to retrieve metadata to scholarly papers stored locally as PDF files. A fingerprint is produced from the PDF fulltext to query an online metadata repo...
David Aumüller
ACSAC
2008
IEEE
14 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
SEMCO
2008
IEEE
14 years 4 months ago
Using Similarity Measures for Context-Aware User Interfaces
Context-aware user interfaces facilitate the user interaction by suggesting or prefilling data derived from the user’s current context. This raises the problem of mapping conte...
Melanie Hartmann, Torsten Zesch, Max Mühlh&au...
ICDS
2007
IEEE
14 years 4 months ago
On Smart-Care Services: Studies of Visually Impaired Users in Living Contexts
- Smart care technology is any sensor based technology used to aid and support human independent living. Such technologies offer new potential and can give rise to new problems for...
Ying Liu, Jean Bacon, Roger Wilson-Hinds