Sciweavers

3086 search results - page 600 / 618
» Developing Secure Web Applications
Sort
View
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 6 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
CVPR
2012
IEEE
11 years 10 months ago
Batch mode Adaptive Multiple Instance Learning for computer vision tasks
Multiple Instance Learning (MIL) has been widely exploited in many computer vision tasks, such as image retrieval, object tracking and so on. To handle ambiguity of instance label...
Wen Li, Lixin Duan, Ivor Wai-Hung Tsang, Dong Xu
BMCBI
2008
146views more  BMCBI 2008»
13 years 7 months ago
EST Express: PHP/MySQL based automated annotation of ESTs from expression libraries
Background: Several biological techniques result in the acquisition of functional sets of cDNAs that must be sequenced and analyzed. The emergence of redundant databases such as U...
Robin P. Smith, William J. Buchser, Marcus B. Lemm...
ICSE
2007
IEEE-ACM
14 years 1 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
DCC
2007
IEEE
14 years 7 months ago
On Compression of Encrypted Video
We consider video sequences that have been encrypted uncompressed. Since encryption masks the source, traditional data compression algorithms are rendered ineffective. However, it...
Daniel Schonberg, Chuohao Yeo, Stark C. Draper, Ka...