Sciweavers

998 search results - page 100 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
ICPR
2000
IEEE
14 years 10 months ago
Embedded Formulas Extraction
A new approach for separating mathematics from usual text is presented. Contrary to the existing methods, it is more oriented toward the segmentation than the recognition, isolati...
Abdel Belaïd, Afef Kacem, Mohamed Ben Ahmed
WWW
2007
ACM
14 years 9 months ago
Identifying and discriminating between web and peer-to-peer traffic in the network core
Traffic classification is the ability to identify and categorize network traffic by application type. In this paper, we consider the problem of traffic classification in the netwo...
Jeffrey Erman, Anirban Mahanti, Martin F. Arlitt, ...
CHI
2003
ACM
14 years 9 months ago
Shorthand writing on stylus keyboard
We propose a method for computer-based speed writing, SHARK (shorthand aided rapid keyboarding), which augments stylus keyboarding with shorthand gesturing. SHARK defines a shorth...
Shumin Zhai, Per Ola Kristensson
SAC
2010
ACM
14 years 3 months ago
Extraction of component-environment interaction model using state space traversal
Scalability of software engineering methods can be improved by application of the methods to individual components instead of complete systems. This is, however, possible only if ...
Pavel Parizek, Nodir Yuldashev
SAC
2010
ACM
14 years 3 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...