Sciweavers

461 search results - page 15 / 93
» Fundamentals of concern manipulation
Sort
View
ICMCS
2006
IEEE
164views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Video Break Detection based on Similarity Analysis and Temporal Statistical Characteristics
Video Shot boundary detection is a fundamental task in any kind of video content manipulation and retrieval. The area of shot boundary detection has been extensively studied, but ...
Jianjun Huang
MPC
2004
Springer
123views Mathematics» more  MPC 2004»
14 years 27 days ago
Constructing Polymorphic Programs with Quotient Types
The efï¬cient representation and manipulation of data is one of the fundamental tasks in the construction of large software systems. Parametric polymorphism has been one of the mo...
Michael Abbott, Thorsten Altenkirch, Neil Ghani, C...
TELSYS
2010
132views more  TELSYS 2010»
13 years 2 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
SIGMOD
2011
ACM
238views Database» more  SIGMOD 2011»
12 years 10 months ago
Data management over flash memory
Flash SSDs are quickly becoming mainstream and emerge as alternatives to magnetic disks. It is therefore imperative to incorporate them seamlessly into the enterprise. We present ...
Ioannis Koltsidas, Stratis Viglas
HT
2005
ACM
14 years 1 months ago
Adaptive personal information environment based on the semantic web
In order to support knowledge workers throughout their task of searching, locating and manipulating information, a system that provides information suitable for a particular userâ...
Thanyalak Maneewatthana, Gary Wills, Wendy Hall