Sciweavers

935 search results - page 169 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
ICSE
2012
IEEE-ACM
11 years 10 months ago
WitchDoctor: IDE support for real-time auto-completion of refactorings
—Integrated Development Environments (IDEs) have come to perform a wide variety of tasks on behalf of the programmer, refactoring being a classic example. These operations have u...
Stephen R. Foster, William G. Griswold, Sorin Lern...
TON
2012
11 years 10 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
IRCDL
2008
13 years 9 months ago
Using MPEG-7 for Automatic Annotation of Audiovisual Content in eLearning Digital Libraries
In this paper we present a prototype system to enrich audiovisual contents with annotations, which exploits existing technologies for automatic extraction of metadata (such as OCR...
Giuseppe Amato, Paolo Bolettieri, Franca Debole, F...
LREC
2008
130views Education» more  LREC 2008»
13 years 9 months ago
COLDIC, a Lexicographic Platform for LMF compliant lexica
Despite of the importance of lexical resources for a number of NLP applications (Machine Translation, Information Extraction, Event Detection and Tracking, Question Answering, amo...
Núria Bel, Sergio Espeja, Montserrat Marimo...
EWC
2006
114views more  EWC 2006»
13 years 7 months ago
Automated symmetry exploitation in engineering analysis
In engineering analysis, geometric symmetry, when exploited, has two potential benefits: (1) it can significantly reduce the computational time, and (2) it can simultaneously impr...
Krishnan Suresh, Ameya Sirpotdar