Sciweavers

15781 search results - page 3007 / 3157
» Evaluating Information Extraction
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 7 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
BMCBI
2011
14 years 7 months ago
Computable visually observed phenotype ontological framework for plants
Background: The ability to search for and precisely compare similar phenotypic appearances within and across species has vast potential in plant science and genetic research. The ...
Jaturon Harnsomburana, Jason M. Green, Adrian S. B...
CHI
2011
ACM
14 years 7 months ago
Twitinfo: aggregating and visualizing microblogs for event exploration
Microblogs are a tremendous repository of user-generated content about world events. However, for people trying to understand events by querying services like Twitter, a chronolog...
Adam Marcus 0002, Michael S. Bernstein, Osama Bada...
161
Voted
CHI
2011
ACM
14 years 7 months ago
MediaDiver: viewing and annotating multi-view video
We propose to bring our novel rich media interface called MediaDiver demonstrating our new interaction techniques for viewing and annotating multiple view video. The demonstration...
Gregor Miller, Sidney Fels, Abir Al Hajri, Michael...
ESWS
2011
Springer
14 years 7 months ago
Contextual Ontology Alignment of LOD with an Upper Ontology: A Case Study with Proton
The Linked Open Data (LOD) is a major milestone towards realizing the Semantic Web vision, and can enable applications such as robust Question Answering (QA) systems that can answe...
Prateek Jain, Peter Z. Yeh, Kunal Verma, Reymonrod...
« Prev « First page 3007 / 3157 Last » Next »