Sciweavers

154 search results - page 26 / 31
» Evaluating Information Contributions of Bottom-up and Top-do...
Sort
View
WWW
2004
ACM
14 years 7 months ago
Efficient web change monitoring with page digest
The Internet and the World Wide Web have enabled a publishing explosion of useful online information, which has produced the unfortunate side effect of information overload: it is...
David Buttler, Daniel Rocco, Ling Liu
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
IJHPCA
2010
105views more  IJHPCA 2010»
13 years 5 months ago
A Pipelined Algorithm for Large, Irregular All-Gather Problems
We describe and evaluate a new, pipelined algorithm for large, irregular all-gather problems. In the irregular all-gather problem each process in a set of processes contributes in...
Jesper Larsson Träff, Andreas Ripke, Christia...
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
KI
1995
Springer
13 years 10 months ago
Integrating Vision and Language: Towards Automatic Description of Human Movements
The integration of vision and natural languageprocessingincreasingly attracts attention in different areas of AI research. Up to now, however, there have only been a few attempts a...
Gerd Herzog, Karl Rohr