Sciweavers

7984 search results - page 1352 / 1597
» Exploring personal information
Sort
View
DIMVA
2010
15 years 5 months ago
Evaluating Bluetooth as a Medium for Botnet Command and Control
Abstract. Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, man...
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Tr...
137
Voted
HVEI
2010
15 years 5 months ago
Efficient motion weighted spatio-temporal video SSIM index
Recently, Seshadrinathan and Bovik proposed the Motion-based Video Integrity Evaluation (MOVIE) index for VQA.1,2 MOVIE utilized a multi-scale spatio-temporal Gabor filter bank to...
Anush K. Moorthy, Alan C. Bovik
129
Voted
LREC
2010
169views Education» more  LREC 2010»
15 years 5 months ago
An Evaluation of Technologies for Knowledge Base Population
Previous content extraction evaluations have neglected to address problems which complicate the incorporation of extracted information into an existing knowledge base. Previous qu...
Paul McNamee, Hoa Trang Dang, Heather Simpson, Pat...
LREC
2010
155views Education» more  LREC 2010»
15 years 5 months ago
Automatic Acquisition of Chinese Novel Noun Compounds
Automatic acquisition of novel compounds is notoriously difficult because most novel compounds have relatively low frequency in a corpus. The current study proposes a new method t...
Meng Wang, Chu-Ren Huang, Shiwen Yu, Weiwei Sun
DMIN
2007
158views Data Mining» more  DMIN 2007»
15 years 5 months ago
Mining Frequent Itemsets Using Re-Usable Data Structure
- Several algorithms have been introduced for mining frequent itemsets. The recent datasettransformation approach suffers either from the possible increasing in the number of struc...
Mohamed Yakout, Alaaeldin M. Hafez, Hussein Aly
« Prev « First page 1352 / 1597 Last » Next »