Sciweavers

1005 search results - page 176 / 201
» Information systems security engineering: a critical compone...
Sort
View
CORR
2010
Springer
194views Education» more  CORR 2010»
13 years 5 months ago
An Effective Method of Image Retrieval using Image Mining Techniques
The present research scholars are having keen interest in doing their research activities in the area of Data mining all over the world. Especially, [13]Mining Image data is the o...
A. Kannan, V. Mohan, N. Anbazhagan
IUI
2010
ACM
14 years 5 months ago
Facilitating exploratory search by model-based navigational cues
We present an extension of a computational cognitive model of social tagging and exploratory search called the semantic imitation model. The model assumes a probabilistic represen...
Wai-Tat Fu, Thomas George Kannampallil, Ruogu Kang
OTM
2009
Springer
14 years 3 months ago
Ontology-Driven Provenance Management in eScience: An Application in Parasite Research
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experime...
Satya Sanket Sahoo, D. Brent Weatherly, Raghava Mu...
CC
2005
Springer
323views System Software» more  CC 2005»
14 years 2 months ago
CodeSurfer/x86-A Platform for Analyzing x86 Executables
CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis algorithm called value-set analysis (VSA) to recover intermediate representations that...
Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, T...
PAMI
2006
227views more  PAMI 2006»
13 years 8 months ago
Matching 2.5D Face Scans to 3D Models
The performance of face recognition systems that use two-dimensional images depends on factors such as lighting and subject's pose. We are developing a face recognition system...
Xiaoguang Lu, Anil K. Jain, Dirk Colbry