Sciweavers

364 search results - page 36 / 73
» Discovering Hidden Evidence
Sort
View
ECIS
2003
13 years 10 months ago
Do you know your terms? - A procedure model for terminology management
Due to the extensive development und use of information technology, a lot of companies gained access to vast internal and external information sources. Yet nonetheless, efficiency...
Stefan Kremer, Lutz Kolbe, Walter Brenner
APIN
1998
78views more  APIN 1998»
13 years 8 months ago
The Method of Assigning Incidences
Incidence calculus is a probabilistic logic in which incidences, standing for the situations in which formulae may be true, are assigned to some formulae, and probabilities are as...
Weiru Liu, David McBryan, Alan Bundy
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
13 years 6 months ago
Unsupervised discovery of repetitive objects
We present a novel approach for unsupervised discovery of repetitive objects from 3D point clouds. Our method assumes that objects are geometrically consistent, and uses multiple o...
Jiwon Shin, Rudolph Triebel, Roland Siegwart
IJDSST
2010
163views more  IJDSST 2010»
13 years 6 months ago
User's Behaviour inside a Digital Library
Abstract: CASPUR allows many academic Italian institutions located in the CentreSouth of Italy to access more than 7 million of articles through a digital library platform. We anal...
Marco Scarnò
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
14 years 2 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...