Sciweavers

7366 search results - page 1369 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
BMCBI
2007
134views more  BMCBI 2007»
15 years 4 months ago
Benchmarking natural-language parsers for biological applications using dependency graphs
Background: Interest is growing in the application of syntactic parsers to natural language processing problems in biology, but assessing their performance is difficult because di...
Andrew B. Clegg, Adrian J. Shepherd
WWW
2010
ACM
15 years 11 months ago
Stop thinking, start tagging: tag semantics emerge from collaborative verbosity
Recent research provides evidence for the presence of emergent semantics in collaborative tagging systems. While several methods have been proposed, little is known about the fact...
Christian Körner, Dominik Benz, Andreas Hotho...
ACSAC
1998
IEEE
15 years 8 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
MASCOTS
2003
15 years 5 months ago
Bottleneck Estimation for Load Control Gateways
Providing Quality of Service (QoS) to inelastic data transmissions in a cost-efficient, highly scalable, and realistic fashion in IP networks remains a challenging research issue....
Krishna Pandit, Jens Schmitt, Martin Karsten, Ralf...
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 10 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
« Prev « First page 1369 / 1474 Last » Next »