Sciweavers

119 search results - page 3 / 24
» Explore Exploit Schemes for Web Content Optimization
Sort
View
RULEML
2009
Springer
14 years 2 months ago
Exploration of SWRL Rule Bases through Visualization, Paraphrasing, and Categorization of Rules
Rule bases are increasingly being used as repositories of knowledge content on the Semantic Web. As the size and complexity of these rule bases s, developers and end users need met...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das
IUI
2009
ACM
14 years 4 months ago
You can play that again: exploring social redundancy to derive highlight regions in videos
Identifying highlights in multimedia content such as video and audio is currently a very difficult technical problem. We present and evaluate a novel algorithm that identifies hig...
Jose San Pedro, Vaiva Kalnikaité, Steve Whi...
WWW
2010
ACM
14 years 26 days ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
ICWE
2010
Springer
13 years 5 months ago
Efficient Term Cloud Generation for Streaming Web Content
Large amounts of information are posted daily on the Web, such as articles published online by traditional news agencies or blog posts referring to and commenting on various events...
Odysseas Papapetrou, George Papadakis, Ekaterini I...
ICASSP
2008
IEEE
14 years 2 months ago
Automatic lecture transcription by exploiting presentation slide information for language model adaptation
The paper addresses language model adaptation for automatic lecture transcription by fully exploiting presentation slide information used in the lecture. As the text in the presen...
Tatsuya Kawahara, Yusuke Nemoto, Yuya Akita