Sciweavers

781 search results - page 134 / 157
» Extracting Useful Information from the Full Text of Fiction
Sort
View
ISW
2007
Springer
14 years 2 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
TROB
2008
228views more  TROB 2008»
13 years 8 months ago
Large-Scale 6-DOF SLAM With Stereo-in-Hand
In this paper, we describe a system that can carry4 out simultaneous localization and mapping (SLAM) in large in-5 door and outdoor environments using a stereo pair moving with 66 ...
Lina María Paz, Pedro Pinies, Juan D. Tard&...
WWW
2004
ACM
14 years 9 months ago
Semantic web applications to e-science in silico experiments
This paper explains our research and implementations of manual, automatic and deep annotations of provenance logs for e-Science in silico experiments. Compared to annotating gener...
Jun Zhao, Carole A. Goble, Robert Stevens
IEEEVAST
2010
13 years 3 months ago
Diamonds in the rough: Social media visual analytics for journalistic inquiry
Journalists increasingly turn to social media sources such as Facebook or Twitter to support their coverage of various news events. For large-scale events such as televised debate...
Nicholas Diakopoulos, Mor Naaman, Funda Kivran-Swa...
BIRTHDAY
2010
Springer
13 years 9 months ago
DKAL and Z3: A Logic Embedding Experiment
Yuri Gurevich and Itay Neeman proposed the Distributed Knowledge Authorization Language, DKAL, as an expressive, yet very succinctly expressible logic for distributed authorization...
Sergio Mera, Nikolaj Bjørner